--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T17:44:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0f4e7fc1-b3a7-4552-9deb-275ca5a4bbe1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:52Z" name: builder-dockercfg-mjn6m namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0f4e7fc1-b3a7-4552-9deb-275ca5a4bbe1 resourceVersion: "3833" uid: 435f3901-b9d3-4e05-ac2d-8bf5fe0739f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dcad4325-ba4f-47dd-bad9-7cda64f46fec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" name: default-dockercfg-h7hnm namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dcad4325-ba4f-47dd-bad9-7cda64f46fec resourceVersion: "3238" uid: 458c57bd-c501-42b0-8e7a-66259107095a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T17:44:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e1aa4785-9e2b-4008-9ae5-c226f366b6b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:52Z" name: deployer-dockercfg-jkjzh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e1aa4785-9e2b-4008-9ae5-c226f366b6b6 resourceVersion: "3834" uid: f1822ff1-96ac-48b6-ac0e-78757c755f2a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJVG1ZcWZtY2VMMkV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3dOelEwTlRBZQpGdzB5TmpBME1qQXhOelV3TlRGYUZ3MHlPREEwTVRreE56VXdOVEphTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBdTlOZzZ1aTZ6NzJmOWQ5eUtOUEMvL1lZSVBLemZVaFlYY0VmU1pBQjNsSHh4SDNnRTk0eQphcWY1blhPOUJwQ2VldDNEMmdjeXk5aTF0T1NPZUtGZ1E2cm5ZcTFtZ2E2KzNwZDU1RGJ5TVM0dGlFMUVHN0xICmZWc0MrSE5yc1BXbk00MjJ6UmZSMWhQQW9VU2NoQTQ3WFY0eUpSM003Wkx3TXBiVVJ6VStPc05Fay9NWnRDK04KYVdHMHp3OVUwbThKb0RySlgvZU0vOWZxZnpiczFNRHBEa1AxSXVxMXZMck1LU2VSYXVNMjRKcm5tekFrenc0MgpxaW43VDRVQW1TcW5GUVljSDh1NllNRFJ2THprdERNV3NQMGQ2N0FrS2s0T0l4TjJVK1Q5L29BUXhrVFNCMkI3CnFqSDJ5VkxkT1Bjd1djWXA1a3JZcmpFLzhUMFQvd05YVHdJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkFjdjlvbXZDWUhGUGZ6dlVLYm1GWnlyeTNScU1COEdBMVVkSXdRWU1CYUFGRjJqUkdZZUxaQzd6ai8wCnVkV3V2MG1sUWRqS01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRGt5WlRNd09ERXlMVGMyTURRdE5EZ3hOQzFoTTJJNExUaGtPRFkyCk0yTmtaV0ZqTURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVFvR0krcHA3RFhpVzE3ZEMxN0ZGa1NLbWU2b3UKQnQ0MjE5QUR1ajJRZURRTEJjMkV2eEMxNlNHMVdXMUlJeHlleW9keDAzZFBpUy9SVzdlc0pYc0dlMUpmK0l1NgpCM0c0clRURWw0YnBGUW9nMmpZaG5aZ0QyRjh2WkR2eStQT2o1dUoraEZwdWtFczdycmpWRlJlY2VlamtkMm4yCko0NG5jZmFabXVUSkVWUDRnaTNxNWN4T2pEa29TbktnTHdmMm9QT21xR0xxVldpUjNUK2ZBeHJOLzBSL2pqUkoKQzRpRnkyN21UbzIwN2IxejNvK01vQTh3ZXJHdUFydFdvQ3cxSU5MTHZGR2tBVFpLUGZXNlp1VHhjRGpRR05PcwpoYVM0WmJtd0kwMk1veTV6TzVYQklyZStqRHJnc0lQbThvbnkyRjNLZk1keWtISDNmVGYwakRaYk9RPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlUM01IbDNFTGJiQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjd056UTBOVEFlCkZ3MHlOakEwTWpBeE56VXdORFJhRncweU9EQTJNVGd4TnpVd05EVmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNRGMwTkRVd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDWmtTSEdsUS9KM3hNUUZNWjVzaWhFS09YZGs1ZXJoZ0hMCnh1OWhwYU5HQzVQNlJSUTVVcnJYWkN1NkRWaG53dUhFRmJXU3lsN2lMdUVpRTdpRHJhbGtHUTFQNGhOTE5FK00Ka2J1WVE3dEorOXY2OTZlSllERkVyRFBpbmVlcjZjdDg0cmFyd3VSZExDYTlLL0pKREZwQXlWZFZwWk0rZEdnQQpzbEYzNHJDUHgwdjZqWHVodXF4ZzlGY3REZnh2Y2dVQVVBazNQVWRudmFJZG9ibGpLSFNjTGFFdGhVdkpHeGMxClJWT0o2OG5DbE94aGdSZXM4eXRMaW95N2dLTUxTckVKVkhMY0NhUkpFbWxzZUIyU3hRbTl3eEZJYmpiT3lSNkUKOTQwanFrOVN6bE1WemhJT0ZTT212QThIUGlnRE5CS3dwdUZVOElBcXpEb1FhaVpTRkduL0FnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUmRvMFJtCkhpMlF1ODQvOUxuVnJyOUpwVUhZeWpBZkJnTlZIU01FR0RBV2dCUmRvMFJtSGkyUXU4NC85TG5WcnI5SnBVSFkKeWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUF3NkoyVlcwYVNUK08vT0NYRS9LWmlINnVKdkgrbXJQbmR1SgpxalJoR2h2T2p2K0pYT01jQmlwSGEvdDQxOFNFd1c1d2ZvL2Z4eDhXdnJzbC9WbW5QZzZoK0pZSlo4MFVJWnZ3Ci9qcy9oZGwwWmhFcW1KcU4xcnhnLytRMXdORjRKREord2MwQWwveGt3eXkwaHRHMCtRUXV3dVBpK2hJWUJuanYKcGxQbFQrRHZxNzZkRXlKRnlvdmQ4VmRyb1JybVdpUGpCUUllT2lSUVBrNUZaRWNWeWxnSHFxSU9haEUwdzlPNApJNXo4MXZUWkx1M09aMUdoL3duR1NMdk9GU3RxeTRHMkIyUCtyeERtOVRkamovOVNnTlBuMDh1dFlLdEhYdEhICmlOY0FpUjNRMGhkZFZReEhkRmltWGFLUEdGWHBxQU9MNnl6aWNxR0IzdWlnV0pWZmJRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T17:50:52Z" service.beta.openshift.io/expiry: "2028-04-19T17:50:52Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 92e30812-7604-4814-a3b8-8d8663cdeac0 creationTimestamp: "2026-04-20T17:50:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"92e30812-7604-4814-a3b8-8d8663cdeac0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T17:50:53Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 92e30812-7604-4814-a3b8-8d8663cdeac0 resourceVersion: "7901" uid: 4c12fa13-8544-4e2b-bcba-76d954a032f6 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f1b25ec-0c3e-45dd-8e7c-c4c9008c8dc1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" name: dns-dockercfg-82cw8 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 5f1b25ec-0c3e-45dd-8e7c-c4c9008c8dc1 resourceVersion: "3239" uid: 425ff688-e688-41b4-bb0c-a1104216e307 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-20T17:44:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3ae6baee-d078-4e04-9858-92773406313d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:46Z" name: node-resolver-dockercfg-8fp5d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 3ae6baee-d078-4e04-9858-92773406313d resourceVersion: "3246" uid: 3ed30cb2-dd99-4436-9cf7-226fb4c12b4a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27163"