--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:27:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80fe7b2b-f4c7-4122-a25a-320fd284f855"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:19Z" name: builder-dockercfg-529hf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 80fe7b2b-f4c7-4122-a25a-320fd284f855 resourceVersion: "3743" uid: 177c170d-71d8-41e7-a922-9169a76271f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:27:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ec9f92a-fcbb-42cc-942c-2f3af1ef1359"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:14Z" name: default-dockercfg-nmf6c namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3ec9f92a-fcbb-42cc-942c-2f3af1ef1359 resourceVersion: "3144" uid: 3c30cc03-b912-4ef1-aecf-0baf2bf8aad6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:27:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c7754b7-d9a0-4506-9e75-b4db0c23d377"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:19Z" name: deployer-dockercfg-xg746 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9c7754b7-d9a0-4506-9e75-b4db0c23d377 resourceVersion: "3736" uid: d4445e68-f3ae-467a-a0f6-9e1e5d5cc12d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJRERzcEN2RXhFT1F3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTBNelU0TnpBZQpGdzB5TmpBME1UY3hOak16TVRGYUZ3MHlPREEwTVRZeE5qTXpNVEphTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBNzBqR3dobE9BNmpLZkJwN1RvRFBRQ0srZW9GYnBEV05IVFhKRkZETDRiZ1FqU2grK1BubwpmVWgrZDlDQnVBVFNRcnpudXVNZ2tnRERGOVRnbERjYVVObGZqN0NJcThpeU5VWE5UNk0wampEOCtzZ3N6OXdaCjZLc1EzbGUrbW91d0RhY3M3MDhoTHJPd1Z3TW5CZTYzeUIrZXBOc3lsV1VXNElSTjdWK3d5ckcrWmdIbVJWOUkKMjBpMTRySjBFTHl0ZSs5VFV3eGRNSm5ieDBKck84UmwyVHNiNDNidlBlNFhhS0VJQWpZV3ErNGpZU1RDRGNscApZM2VtbkFUV1FQalg1aXhKOCtoSlgyVGdWa2lOcUJtd3M4Y2E2YWtlaU5XTnhjVE5yZE9BcjVLU0QvZFkzaStCCmkwaWFUTzNDYUdJM2NHWm5sRTZEMEs1L0x3OXR3VjVSQ3dJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkgzM3Uxem1hR0NuNmsrWTVlSHViQzM5cnkzVk1COEdBMVVkSXdRWU1CYUFGRi9YZ2MzRHBtVE55MThjCnpoWGJEcmI4WStKNk1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRFF6WmpVNFlURTBMV05tWkRRdE5HUmtNeTA0TTJOaExUTmxZalUwCk1qWTRPR1EwWkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW0zaWN4TkQvdzVML0Z5dEl2cG1JcEZRNVp0Vk8KTHFUZXJlZHdGTHlGU3dTL3plL0pSSjZlY21GdmZmMEMwbU9SWFl6UWpYbkxETVhkT09LWUZWNm9IUVNvdGZrOAp3TzllT1Q3QzhvZmVXUGtHaldOUmc1cmlkS3NIY2kvVzhzQ20zOXVtaWphN2NEME96RzY4QVpJWVJVZHNkWXg4CnJHWjRaZGZibWloY3RNYkYvelMxVmVsWXZibEJFclVrU29lemUyZU5GVHF3UDR6TVUzTzJhZWxtMlBGc09QWGoKc0txUXJjcWk1YVdEelB2YlBFOHJtL1RjKytIRGExeXZMbysxbVpYbFFsRTJoODJaUGZzREgza0FMalZmc2wwQwpLOVgyZ0ZiK0lkMlUrZnJGZFBRcmoxRUp3YWsydHF1d09XSFMxVHVIeVlGNnQ3Z05HNXoxbjY1UThRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlBNDdhcW1WNFU1Y3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRME16VTROekFlCkZ3MHlOakEwTVRjeE5qTXpNRFphRncweU9EQTJNVFV4TmpNek1EZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBORE0xT0Rjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDOG9TOUg3SERGSXQ4emRreVhvSDYydXZKaGgvcjIxMXZLCmlTTW55WU5aelBKYnladmdYa0YxQmtnTGt0M0RVdVFWYk1aeFd2dTFvWThuaVlKbDlKMDlZaG9obW5ZeFIrNzMKRVM2Y3V4OEdMQ0FMN3lhTVdEMG5Nb292eUs5WjFmTVEwVGs2ZG9LKy9KZWZFMEZTSGpMUk5FN1VPY3RpNGJ0RgoyQTFia0lFNDBSeGhPSHVRckk5dmFrUEFFLzhiUkZtbzhXRVJ6a01Udk5uRUZKbFpKd0YyUTE2VGs5Wk1EYjdxCk9RazdIN3laMzlxTDlqUnlINmVBaDdScUMzRU5mTFVWUGxSNWRoQkNqVFpnV2J6Tzd4S3ExQmV6Q0YwUTJNa3IKb0ozRmpabmcvbEN4NytpbDdZYUxoemV6bHh5bXJMRVlnWUZZWm5LYW9xcEs5ZWw2NFlDUEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUmYxNEhOCnc2Wmt6Y3RmSE00VjJ3NjIvR1BpZWpBZkJnTlZIU01FR0RBV2dCUmYxNEhOdzZaa3pjdGZITTRWMnc2Mi9HUGkKZWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWFFeEQ5NnU3czhFZi9KM1ArSlJrU2wxNFlONnM5RFhoYVpGcAo1TkRxUlR5T2xiUDNleXBhTzYyRTZMQzc1OXZ1eXVMMW44eklXK1RjL2NkYlFtYUZXSVhGb2FJaVBqaDFCMVczCmlzMGx1NUsyNnJNcUxHU0U3YmVkekR4ZWVEUWpIc0xoWUQzUHFXemxBTHVuU3FpQ0lPeXdZZkcvVzhzS3dNaVMKQ3VHNEVyWjdHT3VUN1FXK1BNV1dqcXFENWJnNmFrZ1lEbkZGdzdhb05zdGt4aXduR2JvbnQremdRVWtRTW1ZUwpjcldIMENvak1Tc2NweHQ3b3kvMGZkbVM4TUNQcDJUbjQxL3JWL3BEYytiSFVhQkkvK200WWlzWnp0RUo3dGh6CloveTJ2NVJTY3Y2VG5OTm82L3Z5ZGgzTUwyRFluQlJMTU53M1JzT0lrcVRrNFNZd3FRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:33:12Z" service.beta.openshift.io/expiry: "2028-04-16T16:33:12Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 43f58a14-cfd4-4dd3-83ca-3eb542688d4d creationTimestamp: "2026-04-17T16:33:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"43f58a14-cfd4-4dd3-83ca-3eb542688d4d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:33:13Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 43f58a14-cfd4-4dd3-83ca-3eb542688d4d resourceVersion: "7893" uid: ddd310e1-6234-473f-954a-f1dc069456fd type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T16:27:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"039769a8-b92f-4a80-80cf-c8f1075e0c39"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:14Z" name: dns-dockercfg-78gjs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 039769a8-b92f-4a80-80cf-c8f1075e0c39 resourceVersion: "3148" uid: c082e441-0a02-4aae-8214-76509a3f09ac type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T16:27:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3fecb45d-0d11-4f7f-87f1-0ae2910a21d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:14Z" name: node-resolver-dockercfg-8lg5q namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 3fecb45d-0d11-4f7f-87f1-0ae2910a21d8 resourceVersion: "3147" uid: d448c7d8-bb8d-4c5d-8ef7-07e9c579787b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "36006"