--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T14:22:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"52f19604-9a4e-4757-8658-a6ee4cb44092"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:07Z" name: builder-dockercfg-thggr namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 52f19604-9a4e-4757-8658-a6ee4cb44092 resourceVersion: "39452" uid: ec609e58-bc7a-4fc3-b5bc-887d016363b4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a044f073-717d-4182-b224-516136541e8f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: default-dockercfg-9bfrd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a044f073-717d-4182-b224-516136541e8f resourceVersion: "39256" uid: dd9bc3b9-565b-4729-87b6-8dd35ca80649 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T14:22:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"061de915-1068-40f8-85de-ae8728537248"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:07Z" name: deployer-dockercfg-trwzk namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 061de915-1068-40f8-85de-ae8728537248 resourceVersion: "39436" uid: b8e5426d-21c2-4f4f-aedc-432313b05551 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJWVJia3huNkxTZ0l3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzRNVFkzTURBZQpGdzB5TmpBME1qRXhOREkzTlRoYUZ3MHlPREEwTWpBeE5ESTNOVGxhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBeU03eUczelpYTjJibmIzaDdUVHhTQllQamdOUGs4UmpZTUlQaTM5bVdIaGYxYmZ6QmlZeQoyeEllZFNzZmhielFvMTVJRVhvMTNmbFJIZWNsMVhZb3BiRHhNNW11K0R0S0VGWndndmxweWh3WlpOWDFYRDRrCjlJUHlvNEhWeGdIbCttb3E1ODdpZkVpRVBGdm1MWnVoQjJVOUNTbW0vcHg4bjRnRnBDdWhWWnhhYWQ2bjIzNi8KWU5pTjhxUVRoRjFiV0NwSnNJQWpQRStDbnY4N0hFWGg1Z3Z2bDRVNEZ5OFpGK3dyRWdYN202UFpmMjBBRExweQpWVlp0V0N4bmR5L1VhT0JJdU9ITkc4T24rTCtqL0lyODRGV0JPckNUWFloeWk2QlVxZWdjbVY0RE1ySWJjTUZyCmVTdVkxdFRhQ1BuVlMxbHEzdWFieWRGM0QvSGJWWm8yc1FJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkxRNE1CWFdDeXlqVnFtSUk2VVBzRXY2dHJQd01COEdBMVVkSXdRWU1CYUFGSHJiMUovb3ZCc2wxejdECmNpTmNEb0lOZnUwRk1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRFpqTW1RMk1tWmxMVGhpT0RRdE5EYzJPUzFpTlRKbUxUZ3lPR0k1Ck1HSXhaR05qWkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXJZa1JUV2x0RnBoSUE0SExBT3BzL0doQzkrMkMKcXdmUlJSQWFHd3FXdjlRMHRaZ2tjdGl1NmhOMHNRK0I5c2x2SmxCTk1yUUNpaGRjSUY2Wkh2Y2lJYlBoVEV4aQp1Q3pUakJtZEFCYkRVSjAxNmpHNVZFblhZNjFWejl1YzRBL3NmcFdkeXBONC9DYnZVMEsraU15a1FmbE9VOUhNCm9mL3QwLzhXWlVpK3lKSHZ6djJyL0c4SG85SXcrQlY2OTg0TWxXbTd4TjVCeUVCQ25tdmhNOVZxK3pIeWlLdFcKOWM2b29ZTHVISVczT2p0YmRQVW8wdGFpdGhvOThjbkJxYit2dWVqNXU5d3RrWFZiWFR2aWp2MHlhYTkyc2dRSgovelZYeDdCMWFsNjZNOEF2Z1BmeTZNYzNsVWtXQmhDcGtIRCtiYlkzQ2RXMm40aEdCQ0Fha2hQWUZnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlMVG9yYUllMEduSXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjNE1UWTNNREFlCkZ3MHlOakEwTWpFeE5ESTNOVEJhRncweU9EQTJNVGt4TkRJM05URmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNPREUyTnpBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEUGJ1K3FHdEw2RVAxOWF2WFhQbVhuTE91ZlgyM3ROREVTCktVa3RDNHUwTS9qWE82bURsbjZwcktNVGRYeldjV0U1RHFCM3ZKMzBMS0JhVmZ3ZTNsclRNV0dRSnZqOUF0ajYKNUd3ZWp6VmNQMDJIZW14N2lIcGlCQnJ6R1V1SWlXT2p2elVpUVJxWDQyRmEvZjlvNlI1MHRia2xpWVo2N3NEUwpzNFNEQjVlQWY2a3lBKzJoa2pvc0dCeTdaSXN0VlhUUjZ6M1dXSlRQcDBJNnFjNVZUSEEzMGRveFAvcTBhYkFLCm1jSEF3cTdLRTR4YXMvejhrYnlDSHdPOHZzTmgzY1NNNkF4T0NCRkN6RnJiY1NxK2RLWUxLVzJnVlEzMXVtT2EKN2Y3RnBmTHN3alIzTlZrV2Z3T0NYT2VXbE8vK1U1RWkxQjd5Wjhac1k0L0tXSkdlaWd5UEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUjYyOVNmCjZMd2JKZGMrdzNJalhBNkNEWDd0QlRBZkJnTlZIU01FR0RBV2dCUjYyOVNmNkx3YkpkYyt3M0lqWEE2Q0RYN3QKQlRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVRHaHpTUE42dm1wUWJvOC8vSXNHVzVzeU9EVlIrRXV5bnVKaQpYeFBZQkY4b0R4eVdncCtMQVdWYjVjajJDd1hlMU4yT25mTHd3U09qaDByeE1GckJwVGo4VmIzTk8vQnYvZmplCkxOTWcveTJRVzdqd2RFcFBoTFJkVThHaWVpOEtGY2YzcUN1Wll6OWVKMEFwWFp3VlljMVFvYzczbEJNZGdaZWcKVVVRM2F1Um9kSlVzTFE4SU05c0tjSmtiVkRjQzhzTWZoTVZvTElXZ05Oa3M5NThCLzdkNTdtV05qQWF4ajJvdgpIbWNEa2ZhWEtIUkV1aGI3Tzh0cUxna3E0dFd3RlM1NWFORzM5U1lMZy9VMnZsTEpta2xPRkRiK2s1WmZnc2t5ClpMRjd5d3lTUXMreXdyVXZmTWN4VzMxa1pFelhtN2ZxQkJ0QU5wUzJDUmNzZmNGTDZ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:27:59Z" service.beta.openshift.io/expiry: "2028-04-20T14:27:59Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 6c2d62fe-8b84-4769-b52f-828b90b1dccd creationTimestamp: "2026-04-21T14:27:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"6c2d62fe-8b84-4769-b52f-828b90b1dccd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:27:59Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 6c2d62fe-8b84-4769-b52f-828b90b1dccd resourceVersion: "7729" uid: 87c39375-877d-4860-9aba-68dd26d614fd type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2f145089-db75-4f31-9a29-ae5681c93a78"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: dns-dockercfg-88srx namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 2f145089-db75-4f31-9a29-ae5681c93a78 resourceVersion: "39243" uid: f9ab29db-33af-4814-9e91-0c9ac4d5600d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-21T14:22:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1de70e3b-2381-4220-ba1d-3231785fa055"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:02Z" name: node-resolver-dockercfg-gcqgm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 1de70e3b-2381-4220-ba1d-3231785fa055 resourceVersion: "39257" uid: f9dafaed-65ce-44f7-bf9b-be4f2c6fc1b4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "50980"