--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:49:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e1a89620-0b81-4e12-b68b-742b6ea737af"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:13Z" name: builder-dockercfg-4ht6h namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e1a89620-0b81-4e12-b68b-742b6ea737af resourceVersion: "3398" uid: bef02d25-7f90-4904-8fd8-33cb19162cc0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:49:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f53f13ed-989a-4c25-93b1-c39c244ed9cf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" name: default-dockercfg-lwhl9 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f53f13ed-989a-4c25-93b1-c39c244ed9cf resourceVersion: "2768" uid: 00396286-d5b3-4095-84ab-51c148347554 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:49:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"783b4f91-669d-43ff-9187-ce26b940eea1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:13Z" name: deployer-dockercfg-5sbrp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 783b4f91-669d-43ff-9187-ce26b940eea1 resourceVersion: "3401" uid: 2d7e7833-4db8-4387-ad5f-3491cd8dd416 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJVUx6cXJkZW53Zm93RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTBORGd3T0RBZQpGdzB5TmpBME1UY3hOalV6TXpOYUZ3MHlPREEwTVRZeE5qVXpNelJhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBeXgzd1l6R1RlQkVSMnFjSllsakMySmxiMC92TFBmQjljVXQwczI5N1BES09yNitTOWo1TwpKRDBMUjFmeUZtWTk0TGlzZjVmaWFTdzk3SWw1M0w3RnVGRzV2cUZWYUtCQXk4MEVsRDdQRWtLd0NxNjl4SzNmClBzWXRMQzNaRXlhSG1aaTdxaXFBdGxsbkN4YkVyU2g0VTIyUGNiSnZNRnlYZWl5T2taWDZPVURmK0w2RFBkTXoKMnh5bG9HbUxlNHIxR0wyQVFhbS9TdjRQOXl4Z2FCRTJRR2pucFpJeS9oTHNpNnp5SHVWWkFpb0dJam5pb2NDMQpRaGZCbDlVNUNIMWVHNTBTOVJNaXVnS2NiSjN3RGsreDRMUjZPMm11dmQ3bUFNM1JucWpxZTA3ZkdYUXVqYTNLClo1RXVUelhMVHpETGxlNWpOT05Mcko1a1EvSEhjRmFJbVFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkducitOdGJiRVhCblZiWG5LUEVVS0o0VGdoTU1COEdBMVVkSXdRWU1CYUFGSkpRZ09GODk1OHkwbTlrCktwbkJUSHNhSE51a01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRGRrT0ROa05XVmlMVEl3T0RjdE5HUXpNaTA1TVRRMkxXVm1Nemt5Ck5HVTNaVGd3WmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWdDbUN4TWI0bW1yejZwOG5Kd0tEWjRFd0p1dGwKK2pybDVMN3ZiL1JaOWx6RFk4UW81dFBxSGUyd3BxdEx3UzE2b1NUNTd5MGVYNjF5bzg0VjR5QktLRDJRMWNsNQpuc1JIU1d4cUVUeDc5YkJtSHpGaWdaYW8rZXMrVk9EcVg0WFJxejJSUUJUVHZBTTJoaktkMkJTbU5NbU9ueGxzCmN2U3hiZTlXRXQ3KzJOSWxBQWZleWdDQUtwQzlNUFZnZlVsOU9MSzNzVDY2S0NPcEJlS2ZDV3lKMWw5UjhyU0EKd2ZUUk4rQVJUS05pK2p1S09VL2tNbGgzVWRGcVhlNXAzVjkyMFFsUy9kdnBrbW9zaG5uMmpKaC9sN0d3VmNuOAptaWJFdDBlZXo1VjRZcktYU2ZHaFBlOS9WekJWQXQxMndZVkp5cUNRbE1xRHNEdnRqemxmNFRienFRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlORmtrVG1UUFBYWXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRME5EZ3dPREFlCkZ3MHlOakEwTVRjeE5qVXpNamRhRncweU9EQTJNVFV4TmpVek1qaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBORFE0TURnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDNDdIVWFKcFhLd3k5RVFNMEpBL2ZhWS9KMHcrcS9DQ0VpCm9zaXkyL2k2eHFLeFZqOEkyUzJLbURBNVl4aXREREJ2Q3B6dTZyKzFwOW1aQ2x3MUorLzI1dHNCS1RHZkJRQWIKZDZtb0ZOZUhRV3c2UmNmYjZ0Mi96VkovMmJLR1FEb0tnUmlvUzJUZGhSb2pIeERFeUpOaEh1M3ZZZDZ6SVBpZQpZZ2RCbzFnOXNRQk5paTZBWGhFdnJyVlVSSllDd0xtYko5a0F2SXAyTTZ3YitNZzZOeURrbno1MXF6Q1ZPc1ZHCmtTTStXeFY4dUxVL0grZ3c2bURDNEVDNzJRRWEzQXFHQ3RYT0dkaGkyM1NrOHhjbCtlaitLUlF2RzNvWUUzQnAKOC9heTAwNGtQanRKaXFMN1lJT0dWT3JQb2hmTHNRQXhsbXJRRFJ4b3RYY0dmeERJQ25nWkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU1NVSURoCmZQZWZNdEp2WkNxWndVeDdHaHpicERBZkJnTlZIU01FR0RBV2dCU1NVSURoZlBlZk10SnZaQ3Fad1V4N0doemIKcERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWIrRnR0NzVQdFlvcm5GRmU5QmlSSTdVaTJyZzY2aXFjdy9VVQo4SVF0bngvK2FkTE1sTmhhYXN6eXMzajdkdHRqZWN0aE9HY2hjRWoxNEhBaHlXaythVG81eGhRd0dHenIvQnNlCkMrbFFnc0ZsZGxXUUt4MjNLeUFVYlUrdFc5ZW1ZOUJ4aDFDeFNpSnQwalFOZ1V1WTh5ckRWUXk5YnNKZWcrb00KSjVhWmtiOUFxNnNKdjlubGJsb3dHS3QyVXJkMXN0N2pja2hMRitXcVFPR1l5eXc1dng1bG9wbEhhcjV4eDExaApmNm1yajdRZ2dGSVdXNnlTTlhJcHNTbnZRSUo0WU9zUDI4bUhkRDYwdjA5VmtTbHVQb2FpVEs3MWFlSTRsbHVNCnRYTTl3WmF2RThNQ3hiRU1VOER5bjlzbVBpZ0R0R3dlOE1OOE9TWnhNOVRqMWlUaGZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:53:34Z" service.beta.openshift.io/expiry: "2028-04-16T16:53:34Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 7d83d5eb-2087-4d32-9146-ef3924e7e80f creationTimestamp: "2026-04-17T16:53:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7d83d5eb-2087-4d32-9146-ef3924e7e80f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:53:35Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 7d83d5eb-2087-4d32-9146-ef3924e7e80f resourceVersion: "7397" uid: 8665c859-af4a-4db1-b170-77207dea9703 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T16:49:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10f18e40-0ab1-4a87-8814-70be326556a6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" name: dns-dockercfg-8mbmc namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 10f18e40-0ab1-4a87-8814-70be326556a6 resourceVersion: "2770" uid: 49766f22-9321-4e69-9c99-9978399a3755 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T16:49:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:49:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e8648e6d-70cb-4d55-916f-282e695836f8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:49:08Z" name: node-resolver-dockercfg-6mljv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: e8648e6d-70cb-4d55-916f-282e695836f8 resourceVersion: "2776" uid: ef959ba9-67d0-42c3-926b-dd8059981fdf type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27594"