--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: console creationTimestamp: "2026-03-12T14:36:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"07909037-ec9f-489a-9716-1755b0822bd8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T14:36:15Z" name: console-dockercfg-d28jx namespace: openshift-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: console uid: 07909037-ec9f-489a-9716-1755b0822bd8 resourceVersion: "15117" uid: 1cc4eefb-ea38-4f2d-a84f-2a3701c2a791 type: kubernetes.io/dockercfg - apiVersion: v1 data: clientSecret: NDMgYnl0ZXMgbG9uZw== kind: Secret metadata: creationTimestamp: "2026-03-12T14:36:22Z" labels: app: console managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:clientSecret: {} f:metadata: f:labels: .: {} f:app: {} f:ownerReferences: .: {} k:{"uid":"e02eaa0b-c1f4-4384-ad79-42bcdcb7ce35"}: {} f:type: {} manager: console operation: Update time: "2026-03-12T14:36:22Z" name: console-oauth-config namespace: openshift-console ownerReferences: - apiVersion: operator.openshift.io/v1 controller: true kind: Console name: cluster uid: e02eaa0b-c1f4-4384-ad79-42bcdcb7ce35 resourceVersion: "15815" uid: 12aa497d-b515-4d19-99b8-22c5c645c589 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/console with hostname console.openshift-console.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: console-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T14:36:23Z" service.beta.openshift.io/expiry: "2028-03-11T14:36:23Z" service.beta.openshift.io/originating-service-name: console service.beta.openshift.io/originating-service-uid: 5879daf0-c81f-45e0-a51f-b2d5a40c9711 creationTimestamp: "2026-03-12T14:36:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5879daf0-c81f-45e0-a51f-b2d5a40c9711"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T14:36:23Z" name: console-serving-cert namespace: openshift-console ownerReferences: - apiVersion: v1 kind: Service name: console uid: 5879daf0-c81f-45e0-a51f-b2d5a40c9711 resourceVersion: "15853" uid: 02ca4dfe-7bcb-4fb2-8939-badebbdbc56b type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-12T14:36:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dd7c9d7d-056f-49b4-bd7c-522e61020541"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T14:36:08Z" name: default-dockercfg-jggtb namespace: openshift-console ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dd7c9d7d-056f-49b4-bd7c-522e61020541 resourceVersion: "14505" uid: 83ca6e6d-e2a5-4676-bb4b-35373fd89112 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40649"