--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T12:49:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f26805e1-b1ff-4ef3-ad33-d48eb6d01757"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:23Z" name: builder-dockercfg-x69rq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f26805e1-b1ff-4ef3-ad33-d48eb6d01757 resourceVersion: "21567" uid: a9f39ce5-41ad-4842-adbf-642d3ff85bdd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T12:49:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d0ff9dd8-76f1-43ad-b189-4d560f692162"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: default-dockercfg-tg579 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d0ff9dd8-76f1-43ad-b189-4d560f692162 resourceVersion: "21407" uid: dcf83950-2d4e-4e33-b069-bfb68e66c3f0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T12:49:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a457889c-ed14-47bb-8c6c-69b74d7378a0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:23Z" name: deployer-dockercfg-dmqgw namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a457889c-ed14-47bb-8c6c-69b74d7378a0 resourceVersion: "21573" uid: 2afc44f4-1f9c-40f6-91cb-764a80bdda68 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJVFJlcVo1WUhVQkl3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpNRFE1T0RBZQpGdzB5TmpBME1UY3hNalUxTURKYUZ3MHlPREEwTVRZeE1qVTFNRE5hTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBNEVzcklwRTU4aERodFMwOE5EVTAvYnIyQjVJT3RhK25ldzA5Z1hHZ1BCRTU2ZnpDSitMNwpPcmJZZVVWR2V1QTdia2lpdWlEaFJwa2dJeElsL1dNbHkrbzUzTkpLaXE5KzNBM09sY3VjRjVlbmdLaGFhN054Ckc0bTNyRkVRWVpXeDBQNVZJZ0NqR0Vuc2JqSHJvVnNWbUg5azNFYlZzbURIdWwxVStSa3daWStSRnVNWTZaSnoKSTJ2Q3FweVBoMnJqTXl1RGhCaHpldE8rRDJNZWFYVzNZK3lodFBSZTVIREdCbE5pa21ENnVkWEdnaUpZUVRQVApYaG1DS1JiWDBzSk13dUExTUdCSEl2WmVvUzJUMEJUOUgxSFNrRGd2QmRsWEdGYXdLMDRyT2Jxc2NERko2VGVKCjBZZ0lla2Z6bzhDTy8ydndQUnpNditDY2c2ME5wLytObFFJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkUwUkFVTDYwbjNSbk4yZkcxNWRseUYralAzOE1COEdBMVVkSXdRWU1CYUFGT0hUMEt1RmZ0amtOeWx2ClI0b0pnMXM1K2tRTU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKRGd6TTJGbFpXWXlMV1ExTmpJdE5ERTRNQzFoTm1ZeExUbG1NV1pqClptSTJNek0xT0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVJRckM3UUQzVXNhdkxMVEdRcEtUanFXazMzQlQKV012TmdGUHdrQk1Tb0lQRmc0K1RITHBINFFzZ0xVWWUvdmZxb2haNGJOcmFkRzhKM3dyenZmekJoUG9wZ2ZZRgpOUHlXZWtISWg5a05laW9yUEtLdURaSmJRMjhnY1VFbVpkRGwxWTVLaytzYVBHUzBpb205MWFsenpQalFsTlJhCnBrMS9vWmtxVUNtclNmV0ZjdUh0Ymk0U1lCa0NadFVRVXA3R2VVR3NEQXpibUJqN3UxZlRXRFNpam5PcEdUbHYKY0w2S3N6WDIrL0hlOGpjeVh2QlZocURUOXIva3dXdUNJckZpaU5QTHVkUjBvanEyOW5zZ3UzcHRJMnMvOVRrbgphMUFpZFFkbzVOTFpVdVR1V2VFcWxZZmRmb2Ewbkt1RTRPNUdnVnNNejdjWDRBOXc2dDhTNjZLbTNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlYYnVWYzlhd1htNHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRek1EUTVPREFlCkZ3MHlOakEwTVRjeE1qVTBOVGRhRncweU9EQTJNVFV4TWpVME5UaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNekEwT1Rnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDL0g1MmZzdmxyNzRmMDl1RWJuaitrT0doL3N5Z3BFeTc3Cms0QzRKU2J4UVQyOHdFbVEwYktoaTlEelF2Q245VUg2a3RWSGNzRG0wNFkyUDJmYm9DRUFVT0xkcXZ5TnVoaloKZXVMRWZxN0drYWZ3VjZYUVdzWUJFQ3VQR1JYVjViVjZZc0RiakdoV1FnQTRmeVp5N2dpSWlQWmYydGI1aTd2MAo3Zzl2TnY3ZVBnangrd095S3orVlZuTXIvREhHRWl3TURlK2hKS1IwTjJhbG44RDlnczUvMlppZ1RTcmRFc1FSCklBUWxlOEJzRUJsQnd5YWxFczdYdnp6aldTY3JLRjV2UGRGMTczbnE4VllzTk9CU0IvT1E5VS9ERzRGZFlFNmEKUmlBanZJV2hLVitIV0xsbVFpbnpzYWs4MmFTWlB5REpwajhrZitXZklsRmQvaUVHVUZockFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVGgwOUNyCmhYN1k1RGNwYjBlS0NZTmJPZnBFRERBZkJnTlZIU01FR0RBV2dCVGgwOUNyaFg3WTVEY3BiMGVLQ1lOYk9mcEUKRERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUhnb1REbVdPOVBMNGpWQ2dBWE8waWZDeEh3dDRWbGpqR1FvcgpEcW81dXJhVlkyRzdEWXBDZU9BaDZrcE9jaUc3Tm1HNGJxWGpNNEZXZ3FiQ0ZGOUM4WjJGVFowUm5VUzZvMm42CmpiWnQyak5oaVRmVlV6UDRud2lUbVVFakplL1c0VGhUWHB4VzRkYXMvM2pGWU5tMWNVMC9iUGdaNHR4WXN2VDcKRzkxMjNZYy9ROVJFK25Qa3hmV0x3UWNQMXZPT3V0eDZveklvQWJneUFzN0NwM3RJVithd3lwaG1lSkI2Ym5VUwoyekMyYjluaExoQzZ3bVJ0T3JWYVVvVStPa3B5My9lM0srTmQ0dWd5RUNDT293REZteVBxMVJvM2RSZTZTK2dvCmRkUkE0WHQrR1crTDMrTEUvbjROaEhlOGRSNFNJTlBJQW9vUmFlTEg4VWw5eHl6ZlNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T12:55:03Z" service.beta.openshift.io/expiry: "2028-04-16T12:55:03Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: 833aeef2-d562-4180-a6f1-9f1fcfb63358 creationTimestamp: "2026-04-17T12:55:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"833aeef2-d562-4180-a6f1-9f1fcfb63358"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T12:55:03Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: 833aeef2-d562-4180-a6f1-9f1fcfb63358 resourceVersion: "7652" uid: 5a682138-121b-4417-b4e8-3e6dd40339f4 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T12:49:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b1515cfd-ec8c-4c80-addf-4c61559e4eb3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: dns-dockercfg-9bfrd namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: b1515cfd-ec8c-4c80-addf-4c61559e4eb3 resourceVersion: "21391" uid: ae6f3a25-682b-4b41-976f-db98e32ef7c5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T12:49:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"475865e0-729e-4648-9444-73c95ed1b91c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T12:49:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T13:25:18Z" name: node-resolver-dockercfg-lvr2z namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: 475865e0-729e-4648-9444-73c95ed1b91c resourceVersion: "21412" uid: f110369b-468b-42d0-81cf-457ee7148881 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27399"