--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:15:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e054b7fb-5d7f-4db1-9e89-10c29bfd23e0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:10Z" name: builder-dockercfg-6mbvm namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e054b7fb-5d7f-4db1-9e89-10c29bfd23e0 resourceVersion: "41811" uid: cec3096a-af09-4bea-a404-f27654d5620b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-network-operator creationTimestamp: "2026-04-16T19:15:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2b4338ff-231b-4ec5-8679-445536c416f0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:06Z" name: cluster-network-operator-dockercfg-mrw5f namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-network-operator uid: 2b4338ff-231b-4ec5-8679-445536c416f0 resourceVersion: "41633" uid: 85418737-19a3-4077-90f8-2f0b0bfe7397 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:15:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"28ddc29b-e8c8-40a9-9fe1-7c628a01e3c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:06Z" name: default-dockercfg-5vftr namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 28ddc29b-e8c8-40a9-9fe1-7c628a01e3c7 resourceVersion: "41624" uid: 6d8d48a2-60eb-426a-82e5-1cf601bc58b6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDg0MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:15:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cbb0327e-130f-405f-bc82-cfaee4abc5cf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:10Z" name: deployer-dockercfg-tzqjm namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cbb0327e-130f-405f-bc82-cfaee4abc5cf resourceVersion: "41820" uid: a47380fd-ec9e-4990-8161-9779f7e6cc77 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDk2MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: iptables-alerter creationTimestamp: "2026-04-16T19:15:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4cab276a-8761-43e2-b937-609c278069ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:17Z" name: iptables-alerter-dockercfg-dmmlb namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: iptables-alerter uid: 4cab276a-8761-43e2-b937-609c278069ff resourceVersion: "41946" uid: 6290a8a4-4e17-4c81-958b-5cccc8b3c77b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVhVENDQTFHZ0F3SUJBZ0lJQ0EyYVpsckxSdnd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTJOekV5TlRBZQpGdzB5TmpBME1UWXhPVEU1TURCYUZ3MHlPREEwTVRVeE9URTVNREZhTURNeE1UQXZCZ05WQkFNTUtDb3ViV1YwCmNtbGpjeTV2Y0dWdWMyaHBablF0Ym1WMGQyOXlheTF2Y0dWeVlYUnZjaTV6ZG1Nd2dnRWlNQTBHQ1NxR1NJYjMKRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFESEpKNE5HSDRSdlcxWlNxN1RLNGZueGxIdTNqVUlQTVV1bW1EOQpqMzdIdG9FRk1NVExmbll2NHZaMUlScW50WnhmOGozTFc2am9lV0xIaDhFS0ZKcDZvdnlXaUdJYlVxelRpdGJzCk9RSUx3WGRPQTU0dE5XaVpaOFZxQU1wK2gzSjYwTGFnbEJxdFoyZGo1Um5qY041OTBaV2tjZUswYXU0TThoeTgKOEJTZ2VoSzRBczJNUU9BelN5SE5Zc0cwZWYyczRnVXBoOEJmZmFhVzdHWVVxaEJVbVVtSDJWdCtlNkdnKzc0aApGdkQ3YmRDMTFmSmhpT21HQmp4eHdOQms1TWF0eWw2Ym9xeW40QlBxL1kxNHk5d1B4NTY1UTVKWmRPZzlvNjlDCnl6MGErTzlxMG5lMSttTTgvS2xIaHo2dHJRdlMyU2hKMkYrdE5Ld2FtZGFrQ3dyOUFnTUJBQUdqZ2dGOE1JSUIKZURBT0JnTlZIUThCQWY4RUJBTUNCYUF3RXdZRFZSMGxCQXd3Q2dZSUt3WUJCUVVIQXdFd0RBWURWUjBUQVFILwpCQUl3QURBZEJnTlZIUTRFRmdRVWszNE5wMUF4Q0trUTVXVXJsZCtZQzBqU3p1SXdId1lEVlIwakJCZ3dGb0FVCmVSVWdqOFhJQzBTVUg4eW9rOHoxL2xIZ1lCQXdnY3NHQTFVZEVRU0J3ekNCd0lJb0tpNXRaWFJ5YVdOekxtOXcKWlc1emFHbG1kQzF1WlhSM2IzSnJMVzl3WlhKaGRHOXlMbk4yWTRJMktpNXRaWFJ5YVdOekxtOXdaVzV6YUdsbQpkQzF1WlhSM2IzSnJMVzl3WlhKaGRHOXlMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNnaVp0WlhSeWFXTnpMbTl3ClpXNXphR2xtZEMxdVpYUjNiM0pyTFc5d1pYSmhkRzl5TG5OMlk0STBiV1YwY21samN5NXZjR1Z1YzJocFpuUXQKYm1WMGQyOXlheTF2Y0dWeVlYUnZjaTV6ZG1NdVkyeDFjM1JsY2k1c2IyTmhiREExQmdzckJnRUVBWklJRVdRQwpBUVFtRXlRNFl6ZzBaVFJqWmkxbFpqazFMVFJrWkRVdFlqaG1OQzFpTW1VNVltSmtOR1JpWmpZd0RRWUpLb1pJCmh2Y05BUUVMQlFBRGdnRUJBRUwvVXBrY1piQW5jMlliMGY2dm5rNmJZREZxNWRJWThsWitHT1VWQ1FaM3k1SVcKeWFxSzhMTEZOWDJSU3hqTVZHOWEyQXphUWVUNmlxRHBRajlzQ3V5aE9iY3VEcUs0L1VZVXVScGozTlRvU2JxcgpCanZsRm5UK29QNFRvWmRLaW5xOFpWUWgzT20rWk9kY0xKNDlUbUMxVHNhazdKN0ovdDB0SkttVTlHV0Q2V3VhCkJEOGpObE1adjhIUjRPbTdETWxtREg5aytyMnIrSU9BUkJaMXNhckdqemZLdjJiTzhuUjhVbjJoN0ZuK3lDZkUKTjhScWg5VlJSeUthbEM1VXZoU290MU5RUmxIWlJFNm5HL2RWRzRpOEZ2ZE9YN3hLMmVQYlVVQzN0MjREMFBkdQpaaXFtb2FLVG9uMXEwOU03Y2RiUFdNVG41KzI3NlVWMzJsUWprMEU9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJUG53ZDN1OG4wTzh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTJOekV5TlRBZQpGdzB5TmpBME1UWXhPVEU0TkRSYUZ3MHlPREEyTVRReE9URTRORFZhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOell6TmpjeE1qVXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRHNyNkJJWmszRW9aRkpZRkN6UGVEUm5MTFlNdmhlNlZQMAo1eVY2SDJhTlNjU0pTK2JwOTBRakZDUE96eW5TbTk3d2duci9kMkR4dXpPc0V6Uk9EdDl2OFlIRlRxNmQrSjZqCi8rdnF1NnYvTUQveFRHQm13OFRaYkx2Vm5RbTlvb0NDWlMvVWU1QUpVRjE2TE1ucUhPY1Z1VFk3dTdDWmF0NlMKelA4Q2ZpSzZaMldiU3ljRzN6ZTVZY2M3Q3JJQ3RaY3VTNlhtaE9aQ3hZOERDcHhMMXd1SjBHaTU4UEw4bFc1KwpGdGhmMjZlSmhya1o4Rll0Vm50YVFtRTJYODNjQWtLVksyVndGUCsza1RZejNIdWt6d2dOMzRMYllpQjNnVXpLCjNOSkJkVS9RRTlJTjJSY0pOUVZrTU9Dc0hienpOT2ZLQUtnYjU5WkxlRUVNbm5MOGZ5UU5BZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlI1RlNDUAp4Y2dMUkpRZnpLaVR6UFgrVWVCZ0VEQWZCZ05WSFNNRUdEQVdnQlI1RlNDUHhjZ0xSSlFmektpVHpQWCtVZUJnCkVEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFMTE1LTmFlVGExeVd0RkhoaU9OTmJsSnBvVnJJYTZvZDdzMlkKd013MEw3TnA3NTJjU2tSYnlvMU8wbmNtUmRDWVJwUWdXaDd6aE9BSnY4bStQZC8rWllMMTVPWmFGdHVneE9QUwo0MkxUZXJTUWtuYTlpdVRWMll1VDBRT1dBdnFKU3pLQXVZUkZiWmZvZmZocSttMmpSbVJDeTVsYWJxYUEyREtNCmxUTjZvUllCQUdWa2NlY2ZjK3NqSjA0RW0vaGNqWlRYZmZkRFBVMmhDdGdTY0NCeGxQSzhIeEljaG42VktxYlQKYWd5RGZiVGtOaU9ad1owSEEyaERQTE5VU092R2F3aExCWHorNnNKZHNSVEJGZEYrV2pRTFozUE5qNXpvZDBIVwpCbmViM2puYnRwczFkK3hPbW1DMDRCdGpKN3BsbFN1U0M0R0Z6NnNZN285L0NrMlV2dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-network-operator.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:19:01Z" service.beta.openshift.io/expiry: "2028-04-15T19:19:01Z" service.beta.openshift.io/originating-service-name: metrics service.beta.openshift.io/originating-service-uid: 8c84e4cf-ef95-4dd5-b8f4-b2e9bbd4dbf6 creationTimestamp: "2026-04-16T19:19:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"8c84e4cf-ef95-4dd5-b8f4-b2e9bbd4dbf6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:19:02Z" name: metrics-tls namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 8c84e4cf-ef95-4dd5-b8f4-b2e9bbd4dbf6 resourceVersion: "7397" uid: 3c73e5c9-5a1a-4660-8f04-339f148025fa type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "47056"