--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T20:07:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5da0c423-4816-4de2-9728-c592b0a0de50"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:29Z" name: builder-dockercfg-5748n namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5da0c423-4816-4de2-9728-c592b0a0de50 resourceVersion: "44166" uid: 2d945b7c-6144-4db3-9532-273042e2fd98 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: cluster-network-operator creationTimestamp: "2026-04-20T20:07:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1f042867-addf-4a2e-9f72-5d5921fb258d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:24Z" name: cluster-network-operator-dockercfg-d9t42 namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: cluster-network-operator uid: 1f042867-addf-4a2e-9f72-5d5921fb258d resourceVersion: "43972" uid: 0d722004-dfa2-4a0a-832f-a9cd06924b10 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T20:07:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b5a22497-6d0b-444c-8840-6d8e89b6f9ce"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:24Z" name: default-dockercfg-wf6gk namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b5a22497-6d0b-444c-8840-6d8e89b6f9ce resourceVersion: "43975" uid: e11e7eb3-2c46-4704-8134-26a64c162c26 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDg0MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T20:07:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf592a5f-3619-4011-a772-5decf100ede5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:29Z" name: deployer-dockercfg-xnvtq namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bf592a5f-3619-4011-a772-5decf100ede5 resourceVersion: "44182" uid: fdec13fa-f666-4597-9ed2-b0b48e14aac1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDk2MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: iptables-alerter creationTimestamp: "2026-04-20T20:07:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"caa8245e-ca10-40e5-a152-df134ca10a30"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:07:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:43:50Z" name: iptables-alerter-dockercfg-sn7f8 namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: ServiceAccount name: iptables-alerter uid: caa8245e-ca10-40e5-a152-df134ca10a30 resourceVersion: "44602" uid: e3a8531e-c26b-4127-b815-63c3778379aa type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-network-operator.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:13:27Z" service.beta.openshift.io/expiry: "2028-04-19T20:13:27Z" service.beta.openshift.io/originating-service-name: metrics service.beta.openshift.io/originating-service-uid: e6dcba32-b0e0-466a-8eeb-af1c7f9b2daa creationTimestamp: "2026-04-20T20:13:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e6dcba32-b0e0-466a-8eeb-af1c7f9b2daa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:13:28Z" name: metrics-tls namespace: openshift-network-operator ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: e6dcba32-b0e0-466a-8eeb-af1c7f9b2daa resourceVersion: "7793" uid: 5335ebea-5c83-4556-82b9-fd6c657ed73e type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "47201"