--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T23:09:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"980a8219-71dd-46d7-a0eb-7339e85a14d7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:49Z" name: builder-dockercfg-lkwc8 namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 980a8219-71dd-46d7-a0eb-7339e85a14d7 resourceVersion: "4494" uid: 09bb09cc-9050-4fbe-b6bd-20a09dfe4c36 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T23:09:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d59eb3d-beea-446c-8604-e884a82c55bc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:49Z" name: default-dockercfg-8ntsk namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9d59eb3d-beea-446c-8604-e884a82c55bc resourceVersion: "4495" uid: 3d980d1c-3e3c-425f-9616-13cec8053efb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgzMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T23:09:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bb7ed9ea-fb40-4b2d-a1db-bea0daa3862e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:49Z" name: deployer-dockercfg-kg96j namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bb7ed9ea-fb40-4b2d-a1db-bea0daa3862e resourceVersion: "4493" uid: 1377dd80-3e7e-40b7-9b91-56fc39cfdada type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/networking-console-plugin with hostname networking-console-plugin.openshift-network-console.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: networking-console-plugin-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T23:12:56Z" service.beta.openshift.io/expiry: "2028-04-19T23:12:56Z" service.beta.openshift.io/originating-service-name: networking-console-plugin service.beta.openshift.io/originating-service-uid: 89978931-069f-4b48-8e7a-c8c259393073 creationTimestamp: "2026-04-20T23:12:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"89978931-069f-4b48-8e7a-c8c259393073"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T23:12:57Z" name: networking-console-plugin-cert namespace: openshift-network-console ownerReferences: - apiVersion: v1 kind: Service name: networking-console-plugin uid: 89978931-069f-4b48-8e7a-c8c259393073 resourceVersion: "6445" uid: d2559fb0-eb11-4b3c-ac07-88d678172e07 type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "30193"