--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:26:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b39b3012-f92e-4315-98fc-1340d1b1da98"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:29Z" name: builder-dockercfg-dr2pm namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: b39b3012-f92e-4315-98fc-1340d1b1da98 resourceVersion: "4439" uid: 4f6dc4a5-d82e-49bb-a217-3b10249e3903 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:26:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57cb9600-41a8-4d25-8440-5652147db891"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:25Z" name: default-dockercfg-54st7 namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 57cb9600-41a8-4d25-8440-5652147db891 resourceVersion: "3940" uid: d6056bdd-6df3-450e-80ae-e5604461ed9b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:26:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0dda4d2e-5c2a-4b62-9004-5c41bf9a8fae"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:29Z" name: deployer-dockercfg-fd5j2 namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0dda4d2e-5c2a-4b62-9004-5c41bf9a8fae resourceVersion: "4438" uid: a784b79d-e5de-4ba9-9841-b935be02780b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/networking-console-plugin with hostname networking-console-plugin.openshift-network-console.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: networking-console-plugin-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:31:29Z" service.beta.openshift.io/expiry: "2028-04-23T21:31:29Z" service.beta.openshift.io/originating-service-name: networking-console-plugin service.beta.openshift.io/originating-service-uid: dd40aac1-7346-48c7-9188-30d02a595afc creationTimestamp: "2026-04-24T21:31:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"dd40aac1-7346-48c7-9188-30d02a595afc"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:31:30Z" name: networking-console-plugin-cert namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: Service name: networking-console-plugin uid: dd40aac1-7346-48c7-9188-30d02a595afc resourceVersion: "7833" uid: 94c0e045-c9de-4f60-8284-32de974f5281 type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "21452"