--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:03:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:03:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9957cf22-c087-4a04-bbd2-23e6b65e5467"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:03:01Z" name: builder-dockercfg-w4r9l namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9957cf22-c087-4a04-bbd2-23e6b65e5467 resourceVersion: "4294" uid: 126f952b-1a28-4101-a39c-42c3a1e9f690 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:03:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:03:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"82a5ff49-fbd4-4f6f-a91e-9f2f0e47272b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:03:14Z" name: default-dockercfg-rz64w namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 82a5ff49-fbd4-4f6f-a91e-9f2f0e47272b resourceVersion: "4413" uid: 62e930d7-8211-4c92-97b1-2f1789a097ba type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:03:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:03:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a8a51d7e-eb88-401e-996c-04b44d09cd17"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:03:01Z" name: deployer-dockercfg-s4zdx namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a8a51d7e-eb88-401e-996c-04b44d09cd17 resourceVersion: "4293" uid: 365c31e4-1f5f-4a58-9d2e-9f3057a0d37c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/networking-console-plugin with hostname networking-console-plugin.openshift-network-console.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: networking-console-plugin-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:09:00Z" service.beta.openshift.io/expiry: "2028-04-21T19:09:00Z" service.beta.openshift.io/originating-service-name: networking-console-plugin service.beta.openshift.io/originating-service-uid: 68158a30-10a1-4f10-8732-5e49c271fc8b creationTimestamp: "2026-04-22T19:09:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"68158a30-10a1-4f10-8732-5e49c271fc8b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:09:01Z" name: networking-console-plugin-cert namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: Service name: networking-console-plugin uid: 68158a30-10a1-4f10-8732-5e49c271fc8b resourceVersion: "8081" uid: 550c55a0-3be3-4b31-baff-a02ac0e9cfdf type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "27203"