--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:30:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6485d5cc-8d24-430b-b1c9-2a4d0cc2e389"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:25Z" name: builder-dockercfg-r2g86 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6485d5cc-8d24-430b-b1c9-2a4d0cc2e389 resourceVersion: "21778" uid: f40868db-eb23-4365-b72c-ab5f1f53afa4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:30:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b8321ec-0d3d-45d8-8bec-12c3169dd4bc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:21Z" name: default-dockercfg-9hh8d namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5b8321ec-0d3d-45d8-8bec-12c3169dd4bc resourceVersion: "21646" uid: 70c095c7-437c-4790-bd36-1ac500159b66 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:30:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f25f1cb4-0272-4fad-bac9-77db2cade081"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:25Z" name: deployer-dockercfg-nwbv2 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f25f1cb4-0272-4fad-bac9-77db2cade081 resourceVersion: "21784" uid: efc955b5-70af-48b1-bd1d-9ffb2e4d697a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJRkhpNlVLTmdFN0l3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzNNakUzTURBZQpGdzB5TmpBME1qSXhOVE0yTVRaYUZ3MHlPREEwTWpFeE5UTTJNVGRhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBeFpJQmRQMEFSb2t3UjJ6M0xibFBnQjBuTlBNaHQxMTZURnlQaEFPM29GZ2wxdU1YZitWaQpBQzJoRkViVm5MWlFSTHpJL3pVQ1N2YnVNUmtnZlRwNFRMZFQ5Q0ErdXlOWVBwS2VjdEJvYWt4M3NnSW03Y3YzCmdnZXE3UzdoTnI1SkNlR1FyaXdvR2wzQVlaNEgzemtQNXpQOUxwQlJMQzl6WHJSNzRzcHpMYmhRaGtsWXVhbjQKdUxZbjJrcTZIRlNqcHIrRDhUY2s2M3dnKy9iekxvV0U3d0oyb2tmL2M3WmdnTjZiOVBSd3hkVVFrM0llMmN0SwpzSldSaUFvMVNPcGtEYnp4cWE0Wlc5ZFlzY0hGSExnN0RSWXpDZHExWUxIcUhKZnNPaVVUKzdUNXFpZGJUY3B1CnRnVjRhWnRBTFB5Z0xhbTFmbWlKOVBSdHZoMHU0SFpXNlFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkZpcmFhbjlRSWNwY01TeWkrMTY3RUlsNmlGNU1COEdBMVVkSXdRWU1CYUFGR0NNWlUrZ3RuL2dKc1pJCkx1R0FjQ1lVRWRSbE1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1U0WkdWaU9EWm1MVGxoTkRFdE5HTm1PUzA0WkRJeExUWmtNemd3CllUSXdaakJtTmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWdwZ2YzdlhWaEwrSTdaYXJLUE1CeXNDd1JyejYKTktRNzh3NXFGVmg4Ti9FUlRQS3lHU3p4OGx4ZjMrS1FESXZLbFJJUHRaSDlHNDRCMTc0YzE3WjY3cEMrQzJTdQorbmJ2MWZUdCs0aWt6eE4xVkZYNEhKMldRVlhuc3o5ZjhKNjBwRXJDeUx1cUpTZytyL3NMK3U2UytHais2K1dhCkZEMWtEemlENXR6VVl4L2FxcDY0Y0o4VmpLUEgrKzE0L2hNL3hOV1pMVnloeG51bGFQaWlNa1VjVzB4dS9JV1QKRGJ4YWN1V3lVWnN3TTFBdTRiSWxPSnA1OXlJMTFTOUJ4OGMrUmx2NU1XVmN6MkJjd3BVZG5WYjJYTXgzQTN0MAphbzVFNXlUUUVmM1B6R2dWMXhWSXJqc1VCYThRckpTTnAwb3VlN3BqWGNpZVlwZUtOZ2ExRkNyRmlRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVEQ0NBamlnQXdJQkFnSUhVbzFLblVZSHFqQU5CZ2txaGtpRzl3MEJBUXNGQURBMk1UUXdNZ1lEVlFRRApEQ3R2Y0dWdWMyaHBablF0YzJWeWRtbGpaUzF6WlhKMmFXNW5MWE5wWjI1bGNrQXhOemMyT0RjeU1UY3dNQjRYCkRUSTJNRFF5TWpFMU16WXdPVm9YRFRJNE1EWXlNREUxTXpZeE1Gb3dOakUwTURJR0ExVUVBd3dyYjNCbGJuTm8KYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzNNakUzTURDQ0FTSXdEUVlKS29aSQpodmNOQVFFQkJRQURnZ0VQQURDQ0FRb0NnZ0VCQUxiNDVWTHFQQ1RRbnpTUUlCNVNMMGRRckk4NU1vVTNMWVcxCm53SjU1VG5uYWdBR0wrOThTVnBrNUlERDM4N2FwZnRYZ2oxdEd3SXAvMDVZZkdIZzRUQitCRlBQc1doRnRxNUIKYm5TcHdVaGl2cmI0NWhpSDFxc3ZkQm8yL052cDNaVTd1MVJhZEZvNVhiNmRJOVd5NGd5eG9FRllEYXp2MGFiQQp5TDRmNkU2d1hIdmxvMkl1VkZyb3ZsdFozSmpqL1B4Z1hpa3F0dGpJdFY0eEU2L3lnaWd3cEg2TkFZeGZnZGtPCng0Y2h0Mkw3UHZFMEM0Qy9RTEdCeTRBNU5meFowV0VCZHRqb3JzL09PY0Zvai92V1o0czJaWlVGbU1sNGJmUGgKTVZ1eXlGSE45Y1F2dE1idUF6Rm5Kb1BjSXJFMnhDTkN1MWlKWkdXWFVBcDRJZXQ1clhFQ0F3RUFBYU5qTUdFdwpEZ1lEVlIwUEFRSC9CQVFEQWdLa01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZHQ01aVStnCnRuL2dKc1pJTHVHQWNDWVVFZFJsTUI4R0ExVWRJd1FZTUJhQUZHQ01aVStndG4vZ0pzWklMdUdBY0NZVUVkUmwKTUEwR0NTcUdTSWIzRFFFQkN3VUFBNElCQVFDYmlzdE13dXlWZ1hZUmx4ZGtKamJ3dDlDaGNjLzJxWCtZSTdUZgozNm5VemF1ekd0dDI1T1cxdlZJdWx3RkRKVkFGZXB0RmVlY2dscks1SzVpSUdsckJVSC9Zc29DU09sYjRmcklKCnhVemh6aFRCSXUrL0g0RTV4VVpZS3lIK1RScmIyR2RhSU9PeVI1MEMvNXdPcWlncG1xeVlPSWQxOXQzZHVYL2IKdHZ5ZkZzRjZDZkxsTWdwOWdCTzhCR09peEJWdEpuejBtWDQ3a1kzM05scFNQV0JOM1NEVlRDR3NmWjhkUVR0VAoxZHVpUVpSdWp3YmVVaUFsTWd3RHNPd28xY09QTUVmTEU0YlBrU05HSlQ1bHZ3WEtuMmRub0kyeHJmdnZVcktRCmxFN3pPMnNtUmtxRW5HcTY4TEFueGU0MnJZSTZNN0R5SFZ2UllQa2hEWkNSb3o1MQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg== tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:36:17Z" service.beta.openshift.io/expiry: "2028-04-21T15:36:17Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: e8deb86f-9a41-4cf9-8d21-6d380a20f0f6 creationTimestamp: "2026-04-22T15:36:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e8deb86f-9a41-4cf9-8d21-6d380a20f0f6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:36:18Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: e8deb86f-9a41-4cf9-8d21-6d380a20f0f6 resourceVersion: "7497" uid: 5dcf49c4-d4b9-4b8c-93fb-2fdb6337ed36 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-22T15:30:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"356b369c-7b50-414c-a502-3f45400c535a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:21Z" name: dns-dockercfg-xgzsv namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 356b369c-7b50-414c-a502-3f45400c535a resourceVersion: "21645" uid: 42afc1bf-3316-438c-a94c-0bb6a74718d3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-22T15:30:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34b1df8e-1d43-4754-b4b3-ce98352ce24b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:21Z" name: node-resolver-dockercfg-ldwqs namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 34b1df8e-1d43-4754-b4b3-ce98352ce24b resourceVersion: "21652" uid: 10407ec8-7958-4e6a-8b85-b6365e16b632 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "29485"