--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:22:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1a55573-618a-432a-ac9b-2e7908f47eea"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:37Z" name: builder-dockercfg-m6fn7 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b1a55573-618a-432a-ac9b-2e7908f47eea resourceVersion: "21835" uid: 4359ed99-964e-4f48-bac8-4d25f1982071 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:22:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f3b6561-b6ed-4485-99d4-1bb464d2ad30"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:31Z" name: default-dockercfg-xpb27 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5f3b6561-b6ed-4485-99d4-1bb464d2ad30 resourceVersion: "21648" uid: fbf842a4-d4f1-4d05-82ca-4884267cd899 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:22:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d44adc8d-c8c4-4466-95ec-08b814fee7fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:37Z" name: deployer-dockercfg-487gn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d44adc8d-c8c4-4466-95ec-08b814fee7fd resourceVersion: "21840" uid: 7906a7a8-2757-485d-b5c4-fd0e893f2ed8 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJVGhWTnZpMGMzL0l3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpOakE0TlRBZQpGdzB5TmpBME1UY3hOREk0TURsYUZ3MHlPREEwTVRZeE5ESTRNVEJhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBeGQ4L0V6cFJNUUd0Q0pyOEptYjdQaklBVm9vWkdRR2FNS0VyT0RIbVJsMHpFeE5hL01BeQp5RmlVM1pUOU14YlA0K0xRcnRFbTRQQit3YjdZWThJU0p5Umg2eVpxWkdYbXk1eldyT2dWUk56YlJHYitKaDVDCmlDY0docWtWRHAvVlgxcmRFYXNFc1BKNnNtK1hSUU8yamlUM1pYaVMrOUJHTGJXQkVoVzlKSkFTN0pCWTZFSWcKOTNadDdlazJYZlBWaWVrK3lZa2QrU1NlekJHWHBRYnBkRFdyQ1YvVSt2V3BpakJITFUrOWllQ3VGWWlQUUJXWgpScjFhSy9teXBDTEdiZkREQ2FkRUtoOW15cEM4ZU1qZWh3WXBGdXk5K3UyUDZ1Zk1La1hoSmIzZzJQL1hTRlRmCkpibTZpUjhLSm91RGRCT25wRGgrUGlzYVNFY2RmRjVCMndJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkpERHpxd3Vvak4zL0U3MG96OWpHKzNBRVNURk1COEdBMVVkSXdRWU1CYUFGSmZ3QTA5V1dRb05UTDVTCjQ1WWNLbUI1N3RUa01GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKREl6T0dKak16SmlMVFJtTURRdE5ESmpNUzA0T1RVeUxXRXlaV1ExCk5XSmxZakJsWXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWxCQ3lidTVmYzhvVzJSb3QxeXFGd1VVQlppL3YKOUhiekR5QjlBbmlrYVJrcEh2WlNndDJLQjh5Zm56U2t0VS9nb2J5MHBQdnBYeVpQZ3ZOb1ptc28rR2pXcHk1bQprY01FbldvUUN0SkdscnVSTGY2Z29OY0YwaVZzR2lTbHlkZmdHUzM4eXFoV241TW9MNllHNjFWT1N5ZzV0NUpuCnBKNlFBak5NMEMrbDREQVF2cVd6dVY5RGFVZHdYMjJtT0g3TjBwckpVN0dKemdWVytPS0lIRnNWV3JwSW1odGsKWFZCQzJvcGFLRWY2Mm5aRUFWaFpkVFVYcldoMmxYczVucUllMVlUTGllelFOVUhIYy84TThoUzdLUzNLSlQ2cwo1UldWSmRrZmlpUWJGNDFUNjhiZ3p1SnJDL1BSN2oxSWJBUTlUWVlyOUdyNFNSNk1vZG5RRi9QQnBBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlDMlZHa0NYVC9tOHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRek5qQTROVEFlCkZ3MHlOakEwTVRjeE5ESTRNRFJhRncweU9EQTJNVFV4TkRJNE1EVmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNell3T0RVd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFERDNNNGNsWUhTbG5JUHhXR1lhMFpldmFJdUFQdnpvQklTCkNjdFNZMGZwTjN0UjluSXlMbmlQT0praTYraVZuNFJWV2Q0UGwzQkd4alBCMjdHNThGa08vdm5zRTREbDM2UlQKY1lNK3Vjc1ZSSVl4eDVzcS9Eb2IrR1NOejkwd1BHRmowMldCY2N4UndnbXRScXppcXY2M2F4c29LZHBnbFdaZgpZbngvU3J2N28zdWxOa25OdkYzZ0dUanJOMDdEQmZVMFNvMDZVMzlpbHprZUI2L29oSGVNQ3V3RXN1N09hUDRzCmxMWDI1ZXUvK0lUQmhHWW5zKzR6WjllN2ZOSGc0S2NwSmlMSXVzZEZOVmMxb3BSTHJCRzhvNG8xb2ZQcWdwUmkKeVgydFRWZEFQciszMmFNZmxCU3A2eVhoVGZCQ2RKSlBvN2F0Znd1TXZkYXVvUjl3WDY4ckFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU1g4QU5QClZsa0tEVXkrVXVPV0hDcGdlZTdVNURBZkJnTlZIU01FR0RBV2dCU1g4QU5QVmxrS0RVeStVdU9XSENwZ2VlN1UKNURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWQxbmlWcVBrc0EvVVZRMmxPSE9laEJRbDVIMHR6ditzSUJTVwpSejVodlg2QmJUVm54U1pTcHBDek9IOG5DZUlBeW9yaGhEMmlHa0Z6SGRtcHZMdVRrK1FHNFk1NXQrZks5VlYvCkRPZDZFTUFKc1ViT0FOaHB5WlFQRGxFS0t2YVkwMEoxaE00cjRacUJwSHFJbWZXM2tSYlphK01tejNWeEdsemsKNGRuNU55WWdDbit0WjlETWxOVjBZbzZ6a3MrRUZBb2VOWUc4ZW5PbVVYaG11cGtXcm9TR04yQVMvdjlFalJEQQo1WjY0TTN4bnFQVUx4L1NjMzdUcEhpTVkybTdDODJUN3JpNDh0ZzZnWXc0S0dFdE10QWhKcnNEb2NPaTN6QlhpCmF1V2hzYmN5OEhaUE00TGhUbTJqQVQxSGtlWUhkVEd6YWpwRWhXcktqVzZSejEvb1BRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:28:10Z" service.beta.openshift.io/expiry: "2028-04-16T14:28:10Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 238bc32b-4f04-42c1-8952-a2ed55beb0ec creationTimestamp: "2026-04-17T14:28:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"238bc32b-4f04-42c1-8952-a2ed55beb0ec"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:28:11Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 238bc32b-4f04-42c1-8952-a2ed55beb0ec resourceVersion: "7677" uid: e7272b1b-3345-411e-890a-6f83cbd56a0c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T14:22:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"492b4254-5161-4f3e-85b3-b8d0e6296f0b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:31Z" name: dns-dockercfg-p2qzh namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 492b4254-5161-4f3e-85b3-b8d0e6296f0b resourceVersion: "21635" uid: d319430e-406c-4354-b8f3-73c187922ced type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T14:22:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0d56c42a-b3b1-4a38-94eb-e48861e3a550"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:31Z" name: node-resolver-dockercfg-s8hdz namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 0d56c42a-b3b1-4a38-94eb-e48861e3a550 resourceVersion: "21639" uid: bad61d78-efe0-4d32-a5a6-abd536669690 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "24810"