--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:47:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"25b0d97e-b266-49e5-98ed-9846e4c0e7b1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: builder-dockercfg-c79r2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 25b0d97e-b266-49e5-98ed-9846e4c0e7b1 resourceVersion: "4265" uid: f8f64bd9-a596-43f6-bbca-0786513636ef type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1d13b1b6-be6a-460d-8f6d-bb0ed451f569"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: default-dockercfg-z5g5x namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1d13b1b6-be6a-460d-8f6d-bb0ed451f569 resourceVersion: "4096" uid: d5f5f8b0-175c-47c6-9753-674d83cbfb19 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:47:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c288a42b-19a2-495d-924e-79e2aff8790f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: deployer-dockercfg-8fh6g namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c288a42b-19a2-495d-924e-79e2aff8790f resourceVersion: "4263" uid: 75a5f7a1-11af-4edb-9f18-c6c9140952fe type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJR012R1BjS1FUVjh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTFPVEUzTURBZQpGdzB5TmpBME1UY3lNRFV5TlRaYUZ3MHlPREEwTVRZeU1EVXlOVGRhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBcjlWZHFIdUZVeTlKMlhOcDliVkY3bGtkeCtjcklreXhPWk5JeG1FUHcyVno2NnE3OFNpZwoyNmJEcDV1Q3Z6SStOZ3dpdzM5K0FUcHVmUHEwR1Nad0xxaTNlVVZyay9qV3lHT3hWSU95cXlaUmhZSmdNRXFBCis0TmtNcGdWS3paT0dnemNSdzFwZmpKc0VMWUhsbDU2QzNUVUVIcldneVhGbkxNWVlPUW1CZFlZRkczT3RBdkcKQVJkMlRkNTZrNm1tSE9neS9SRHpua0oxY05qeWsvL3gzSVUvOHI1dHBnYW5sQTRiV01jMzVFV3NKLzRDNFdqOApWbi9GNVVlQ1VJMkkyWE1LQWRwMmN5dXN0SG9RbjliTmFidkJCbEx6bzQyb3RLZDNnUkZFZXB5Mk9td2FmU1YzCmVzMVg3R2VHcVBpQVlOM2JrV2R0ci9FY3NhRVlVNVZqRHdJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkwxUVVoV0Y4bExTUHBkVzdVclBoeW11ODFIOE1COEdBMVVkSXdRWU1CYUFGTHR3Q0ZsUEIwMzZMdHB4CjR1OTB6MHV3ZGlPSU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR0V5TnpJMFl6TTFMV1ZqT1RFdE5EUTBNQzA0T1RGa0xXTm1aR1ZtCk9ETXhPV000TlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVVWZmtjWmFqV1NnVDh3YkxvbWdVQ3NxWEg1SnkKelo1aFI3OFdUY2doY3dXQ3JhSmszdzNvZjhoQnVtMGlKRjZkeGp1eWh6Y3NNUk80MUgyaEhvRWlJei9nN2hEdgpMZkxnWnkvS3dqYis2TjJNc08rZ1Q0eHQvaGNocXlnTTF6ZWhzMmZNRmdKSDVpdkhRbTluazVuTnE1UEdidmEvCjlIV3VTYzFKZTRFYzlGMzdEY0FZWUQ1RC9wL0luVm1iOHg4SkdFekxmaGZrbytQbzRwenI4cTZ1SkZyTDl4UUYKUEZXekplOVFkM3BUcEJSbGF2ek1BeTF4NE4xZjhKbGdvMzd5QlhjQWovTFo2eldDU1lXSTlETjRyYm5vTkxVUApnWklmL3RDckdERFhWYU9mUUE1Um1tNGF6L1BaZlM5NHYrOVJSMkovdkVtSFM3Ty83clgzcTJDZy9nPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlIRENmcHo5OE9iRXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRMU9URTNNREFlCkZ3MHlOakEwTVRjeU1EVXlOVEJhRncweU9EQTJNVFV5TURVeU5URmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBOVGt4TnpBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFENDdWb2xCMUppNUthRWFwNFdQeU9MaDFkT2Z2NDRCRFNYCldHVjNUZEhOYmIxWFhTWEpRQVlCUDVVenErdGlmWWlQSngrVGo2VUd2b2VQL0VtdWdzWHY5S3MxREJuL2tEelAKZEJPNzc4VTVMZXhHSTFMaFdQMVpjNWwySmFaT0dYNE5zZnlvdnhVaDZMczJCdHEzakFONXBBdGhrZXBuM0JrRQpPY3diRVNEQ3NQZjNkVDh3bUJmSVJUdW14Z1ZDWFh6a2JvdTM3UGh0UUFwK2ZJamt1Mjl1bkhQQy95YkkxZXB3Ck9MSXYyNldzM0YrWUtvMUJZRjdHT2NLZExZQzZlb3hSNmhNdWRiQWVRV2tPRENnZ2xQQkN5VG90VjRpY3BTT3oKd3V5b3RURjRvcWdWK3VWWjBKWmxMRnJDR2k5KzVBRnZGZVQ4WURnVlNzNGxxM3NkV1BzZkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUzdjQWhaClR3ZE4raTdhY2VMdmRNOUxzSFlqaURBZkJnTlZIU01FR0RBV2dCUzdjQWhaVHdkTitpN2FjZUx2ZE05THNIWWoKaURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUliemRmZ3NicG5oMmsrdk5tUDZLcWZaM214VzV3ekV0bCtVRQorMjlrb2ppYWpvV1hrWE1EUGVIWFF4ckNOL3FoSzJqczJWcGE0SDU2dmxuS1ZZM25WM1BIdmE5VjdCY3dJMngwCk1ZOGJXTkNFcy9iM0FUbFl4QUpwV3hmL1JCcXNWeTl6REZUbFNsaTgwTEhPdUJTd0FUMXJjQ2JsU2pxZWlwVDQKckxRTzBuSHIxWXJMRnlNeUx5SG5RaFFhZHcwTDBnaHJWcGhBWkVoVlFBVXIwdFQwVGRzbEJhT3dzQ3haN1F4YwpwWHpuUGs5ZHhDbDBFR1dYVUcxZjBiOWM0WVdQMWtZanNwUmdLQS91YnM4YXJ6azc2YUxucnJtVlBxNXBpMEtjCm9BalhnWm5VS3o0VU9nbWh4SXkvV0c0UlYwM200SGdmS1VEUnVoallPYyt2cnExYThnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:52:57Z" service.beta.openshift.io/expiry: "2028-04-16T20:52:57Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: a2724c35-ec91-4440-891d-cfdef8319c85 creationTimestamp: "2026-04-17T20:52:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a2724c35-ec91-4440-891d-cfdef8319c85"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:52:58Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: a2724c35-ec91-4440-891d-cfdef8319c85 resourceVersion: "7678" uid: a6d75c0f-95fb-4a10-8a5b-2d91029c694d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18238026-abeb-400a-a2e8-46ca16438bc7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: dns-dockercfg-tswpv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 18238026-abeb-400a-a2e8-46ca16438bc7 resourceVersion: "4097" uid: 9920ce90-a4dd-4e98-b022-863f5b971cb9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9da0cd03-5961-41a7-833d-b1e5288647e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: node-resolver-dockercfg-cf6db namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 9da0cd03-5961-41a7-833d-b1e5288647e9 resourceVersion: "4095" uid: 0d995213-f88c-414d-97f3-484bf41a4360 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26287"