--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:14:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"454a2500-efae-46f6-9d89-ecb2f5e6100a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:21Z" name: builder-dockercfg-xn9tt namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 454a2500-efae-46f6-9d89-ecb2f5e6100a resourceVersion: "4135" uid: 64de291c-7a81-46bc-93ce-5a6ec73d97f2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"558b794a-89f2-47ae-aa18-7584753daf0c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: default-dockercfg-gxdz7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 558b794a-89f2-47ae-aa18-7584753daf0c resourceVersion: "3554" uid: 66a15db6-0870-4a97-992d-9f9f3d1b6ce7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:14:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"802a51b7-b471-42d7-a6ec-41acd3271703"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:20Z" name: deployer-dockercfg-6wdsh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 802a51b7-b471-42d7-a6ec-41acd3271703 resourceVersion: "4127" uid: 2e56e787-3580-49de-bc41-cc648c352e65 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJVzVBcW92K3I0SVl3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTJOVFF6TWpBZQpGdzB5TmpBME1qUXlNVEUzTVRkYUZ3MHlPREEwTWpNeU1URTNNVGhhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBMmNGRy91eUtQY3pjRzl2MUJlaVJJOHlXTHVNbThtRjdQazl3U1BRWFB3WUI3RmpiNHo2aQpGYVJJamNEZVkxU0JRYlNaU2hYZDZBdFNDZ2xDRFF0Qjd6UU1WQVBIS0ttVG9DUzJSK0ZTeGE2YlhFeE90ZVdxCnU2WHlJZTRXM1dJbG5VWHRCNkE2WEh3cC9BUVpOVWNuVzlnMkM0VkdPaGxTelNHVm5NNjFVUHhSRnliK2l6R3cKMVNlUjJaVnlwVk4yQXE5R2xPM1VMU3dyUzU3M3dPdmtFR2c1Q0VKZDdFencwaFRRbGlxVzZ0NlpBVTl4NEp6MApwZGN1dk5mWXdWSWU1TUlDSGlQNFZEb2xpZWJma1NhQmo2ZXYzemtJN0YrMUhVekhXR1cxMXhUTlN4MXBtV1dsCjJmTDBnVG9udlZLeDRFWG8vSE5ZaXlLYnJsUVJBdjAvWlFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRk1IS3hQZUt0T3NUb3ltUXFjbjZieldZMTRDUE1COEdBMVVkSXdRWU1CYUFGQmxHeXpSMmorTmVCU0M4CndmOXQ5enljTEpsV01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1E1TlRoa1pUTmlMVEF6TkRFdE5HWTBaaTA1TW1ReUxUZG1ZbVl5ClpHVTBOVEZqWVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQTNuNHdSQ001ZkVuVmQ3VTVDUVlwcm1BdkxzRWkKeHRaRFRSNmwxU0dIK1c3aUZONFMrUWF3MDExcW1EZHE1b3lkL3AwWFB2ZDBuY01EaGF3UTI2NnBqUExZMXJuSwpLazhtWTZCODJxOVd4Nzh5Ry9WM2N4T0dNMVVQd1daNCt2alJ0ZzdrandTS2ZBQ1FrNlRkZ1FLbkt4SEx1QmgvCjN0V3NGdEZmSGx0enFFTmRyU1hVSVo3NEI1L2pwVWloNmdDYkJTZnFJR3F1Qm9WMGdDTCtpQzJtaU5PRHJsUkwKdkdOalJEQTZOcllSRjNhdVN1NU82dnFkUkNmNjU3ajUyTXFUNDR1K1BTQklCYzdVOWNyeWhZYXJjYjM0cEFzZQpUZGg5c0IxNjkySFRYUEI5a1d5elZHbjlHN1lXZHlCemlBclE1eFZyR3Q2Tm5pV2hWSkF6N3B3Q3lRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlVRVlnR0t3V0FSY3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBMk5UUXpNakFlCkZ3MHlOakEwTWpReU1URTNNVEZhRncweU9EQTJNakl5TVRFM01USmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dOalUwTXpJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEZm1jTWRvRC96Y0RZTXdmL3FKWE1YN2VFRXQ4SXhPVWx0Cm54TG42TlBWa2pyU1hVU2JQYys0c1JHZFZTQnYyVEpzeFloOXJ4cGI0UVlDRm1UcnN2VzIwNFRyNk42RmFWcWUKMlV6d29kekl0UDZ6ajByQmM5L0wxcjRyODcwR2UxczFXSW5UcFFETERxMzZHc0ZuUVUwRnB5S250SkJWUVRLZApyam1ycXZrYlgzTkdzaXNSb24yV0llZG1XUW1UaFRZY25rSjF6S05rRGdHMUpza1c1c3ltL3VXN3JhVWs3OGdjCmxDTzhmd2JzM1lkU2YzNEcvZzY5SnFlMXRGbmpkV2QxbUJqKzJrNElzYnB3T0g0cmZzU3Frb0ZnSVViYzFQZDAKUWdjKzB3bG9yb24wQ1lrcUxBZXMrbm5vTlAveW5PM2NnZEhiT1pZTlNOYmJIRzRLeW0zWEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUVpSc3MwCmRvL2pYZ1Vndk1IL2JmYzhuQ3laVmpBZkJnTlZIU01FR0RBV2dCUVpSc3MwZG8valhnVWd2TUgvYmZjOG5DeVoKVmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUFBdlRYL3RKTjdiQTVOcTJINUR0UWNlTllhRFAzQUU3L1ZVNQpmNlkxL1BxVmxYeG1GOUdNeGZEZDdRZUEvVlVzVEYrNXdNWUp0OURYY2t6LzE1OFNOdHAwaXdNOVhvbEpMa0RvClBhRUJCVmdvaXI3NzByeHFBcGM5SGo5anNqVzFtNWpZZE5PMWxIeHRWOFZNUVpjV0t6Y2p5REkrcUg5UFp6RHcKS3A5MG1uUCtrR2NralhhUDZFUjRIT2JkNnJjR3d2N1pncHdFaElCdnhFVjZGQzJxbHZzRVFJelhwdldqSE15dgpOSGFIVjBWcEkreVl1dTF0eWFvQXRUSmk3QU8yVHd3Zzc3SSt3aWJ3dDh3NEMraW5yUkZCTURuemhsV3lWWlR2Ck9TZXlRd1dRK2p3U0VpSjFmSEpCaDhuN0NmTlhiUEdlRlkvRWpLVUNielgzby9qaFBnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:17:18Z" service.beta.openshift.io/expiry: "2028-04-23T21:17:18Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: d958de3b-0341-4f4f-92d2-7fbf2de451ca creationTimestamp: "2026-04-24T21:17:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d958de3b-0341-4f4f-92d2-7fbf2de451ca"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:17:19Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: d958de3b-0341-4f4f-92d2-7fbf2de451ca resourceVersion: "7004" uid: 8c6239fa-6107-4a85-a7b1-23e7487fa8a0 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18451a85-73dc-4445-84b2-035e941137e8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: dns-dockercfg-9vgbs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 18451a85-73dc-4445-84b2-035e941137e8 resourceVersion: "3556" uid: 97360fd9-69a8-47ba-9902-043b502ea1a1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T21:14:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3fb8bf24-8483-4392-a17a-9b71885bcbeb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:15Z" name: node-resolver-dockercfg-4rdlg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 3fb8bf24-8483-4392-a17a-9b71885bcbeb resourceVersion: "3565" uid: 92c8c842-cb64-4bc7-a74c-a4ad0dc9ae7f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20601"