--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-05-06T17:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dedc463d-2c67-4f63-a5d0-c5d7acc6b8dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:22Z" name: builder-dockercfg-tdq9m namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: dedc463d-2c67-4f63-a5d0-c5d7acc6b8dc resourceVersion: "37328" uid: a96302c0-d9bf-4fe3-8102-711a535a1669 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-05-06T17:07:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4cefb742-96dc-45f3-b7d9-a36f2096c91b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: default-dockercfg-p4n9v namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4cefb742-96dc-45f3-b7d9-a36f2096c91b resourceVersion: "37146" uid: 2d9bc29a-2a46-4ec9-ae49-d3d93de6b7b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-05-06T17:07:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b9faba30-0426-4532-b97a-9373cc15daa2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:22Z" name: deployer-dockercfg-fdrs7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b9faba30-0426-4532-b97a-9373cc15daa2 resourceVersion: "37339" uid: 50991a66-43e1-45c2-8026-baa96ecf6eec type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJRzVqYzlIU01uN2t3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM09EQTROelEyTWpBZQpGdzB5TmpBMU1EWXhOekV4TURsYUZ3MHlPREExTURVeE56RXhNVEJhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBbDRnREhUN05aeTljOUlLckdwVFVpY3hiNGpneXN1eWdwblhENi9IQVhDU3FVU2E5a3pCMQpBa3RkeSsrSkxmbTBJdWNGMkkvOEh2b09zS05YZzkreVVMc25Ock1BOTNvV2tnSU9zQ0RkYnpGaFk5S254WDgzCjcwNmdmbERMVnlWa2VROXJ3dzBod014RVZUWE5zQm5BL3phbTJXc3BlbnA0YThBbjNRU0pmd0RzQmNLTlNTcUEKQlJuMmMyYjJrWVJDdFF0aTZOV3E4UStPa25adnQ5ek1pVHVPSmtraEtndmNWT0E2eWhGNmxHTDkyQmVLTTZQVApZcngraEROb0U2WXNTZy9CR05xTytQTnMxd0ZyZDVkV2F3eDQxTU1SWHFnYnNEZE5rR09PSktUTHZqY2tzMGorClpXNnhJWmJCb3ViMGo3Z1Q3aVRUSXg4TENTVmZic3QxOVFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRk1hV1FmZ0RsYnlmNTZvTlp5bXhXNURXcWxQak1COEdBMVVkSXdRWU1CYUFGQktHVkkrVXB6eVJCY0Z0CnRmQTlUNWQ3NWExaE1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRFE1WW1KbVlUSm1MVEF5WkRndE5EWmhNeTFoWVRBMkxXUmtZamcxCk5EWmtNV1ptWXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWp3VWxpZ1JKTEdsSXNjbnRLcnBUSkdSazQvMW4KMkNVR1VnOGNtc1dGc2Q3a3F2YnBBdHN5alRPNHVjWjhUV0NvcE9TT2ZkSEpHZlVHdmpaYlMyM0FjWXdkNXozRQpIbXFXNTN2aGljWHhyU1RUNVNON3pJbDdYUVdkRHFlc2FDaklEZzRuUEI5OWd6MU8zWnlCTEY0WmkvUm5lcFpTCjRTODZxWllZenYvNk5BTkJmYmhWRG9sKytwRTVKOWJPUlViTk1OTmZxaHhHOTBrdVlyUXh3UWpOMlkvSHBpaTcKSzRJV2ZSZy8yd3NkYW1uZnJ1L3lGbENOUGl5amFEdHI3NndKZGJBRk9KRU5TVDVxV1U3K3dZUG1LM1RtWnJtQQpnaFI4a3k0dzNUZU9SNWsrMkVHYmJHSktLdGwwTkNsV0Z0aVNxMWFSNGlZSUtkdml0eklnU2ZRMzhBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlBNW52QW1vc3lZRXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzT0RBNE56UTJNakFlCkZ3MHlOakExTURZeE56RXhNREZhRncweU9EQTNNRFF4TnpFeE1ESmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Z3dPRGMwTmpJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDYWM2czNoQkxiWmhzWUtrNHR4ai80b09BSWljSWRZajhxCnR4bXF5WU5Uc0lNWlh4T1RmcVJTbWNNU3RXUm9EUGhtRHQ1WUVnVFJJMC95MGxCdUtDTW9tMWVoc25PRDBSMkcKRFJkVzcyYlpwOHhhSmpjNFJqM2xmMEtFemN2T01jSytqMkUySWsxQWlhYnpSQ1pUZnZWNndteFowUWV5ZHJwdgpJSE54VWRVdE1EODdQam9pUEVBSzBZQVdHWFlmeFpwQzJtcmpVNmdhQ2drc0JacjJOM1NoTkowSGhlZmpsa2Z2CkN5WWVzY2VyVFdqSTFTb3hLTFVaYng1ZXRIZ3haUjVVeGRJUUVmeHBJK293SVM4UFFIRlR2TlpybVpFWXVCZFkKcFZOSERoS2M1R0cyR0QyWXNKb20yL0RwL0NIUjNvbzdIVTdOMVNKZzNIRTVkTm9GWENWMUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUVNobFNQCmxLYzhrUVhCYmJYd1BVK1hlK1d0WVRBZkJnTlZIU01FR0RBV2dCUVNobFNQbEtjOGtRWEJiYlh3UFUrWGUrV3QKWVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVVMdU9MdlBvWktTMVgzTU9ZWlRtaDIxN3FDcUkySGkvWTFUSQpmZitsSTlnWEhiUTlJMTR0L3ZRSVVSQnVYTEdwL0wvR0NSUkk4ejNSYnhKdFJLa2lHeVBxYkpORHVlVmhtSUhJCkJYeGNPSnNYYVBEQnpzeG1vUEd2RHRTaWU0cGdZdXg4MXlBOHdldjhHVENNWXE4b01UMS9CZFIxUUdKdGxwdFcKMzdHYU84dlE1TW9mWkwwOGd1TVB1a1dBWUZ2Z1JhblRHMTJQVTMyQjQ0S29YeXM0UVdjQ3IyUllBenJoQUtJQgpBMlQ4RWFrN3N1S1Vic1UrR2VNMzVlM1IzVDcwcGhmTUhtWHNpOENBWXJqekhjVjY0dlB6Sm0rRlNtYy9EaUt6CmxMR2tjb1lGeU5HeDJYL09aSXBFTXZDMlFmUS9oSjg5SXExV0gvTWQza3hYb1ZPWm5RPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-05-05T17:11:10Z" service.beta.openshift.io/expiry: "2028-05-05T17:11:10Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 49bbfa2f-02d8-46a3-aa06-ddb8546d1ffc creationTimestamp: "2026-05-06T17:11:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"49bbfa2f-02d8-46a3-aa06-ddb8546d1ffc"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-05-06T17:11:10Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 49bbfa2f-02d8-46a3-aa06-ddb8546d1ffc resourceVersion: "7266" uid: be3bbcfc-ddb8-40b4-bee2-4fc92f1763b3 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-05-06T17:07:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"628efd22-d737-4f82-9ec3-d13ba87fea9f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: dns-dockercfg-hfv2w namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 628efd22-d737-4f82-9ec3-d13ba87fea9f resourceVersion: "37149" uid: 68828f07-0e8f-457f-8a8b-62e5209afdb6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-05-06T17:07:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a9f7588e-6cb6-47bc-b619-9906dc4b078f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-06T17:07:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-06T17:43:17Z" name: node-resolver-dockercfg-rvt4b namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: a9f7588e-6cb6-47bc-b619-9906dc4b078f resourceVersion: "37161" uid: b91e5e94-a101-4fbf-931e-3d588e110fbe type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39874"