--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-28T19:12:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c9ffd0a8-7fc3-4ec2-b9ea-9d5464d6d97c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:12:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:12:31Z" name: builder-dockercfg-brddf namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c9ffd0a8-7fc3-4ec2-b9ea-9d5464d6d97c resourceVersion: "3882" uid: 69b58e8d-1d47-4a7a-b399-e27323bdf9d5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJY3pkYXczckxqSEF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056UXdNemc1TVRBZQpGdzB5TmpBME1qZ3hPVEU0TVRaYUZ3MHlPREEwTWpjeE9URTRNVGRhTURZeE5EQXlCZ05WQkFNVEsybHVaM0psCmMzTXRZMkZ1WVhKNUxtOXdaVzV6YUdsbWRDMXBibWR5WlhOekxXTmhibUZ5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRGVVRkFZakpYa25mOTFuUTZiMzUzN095RE51K3l2M0FBagpNcGtrREZuQllHTXlqZWZOYWU0Y25nTDJaaEQxYlNSTGNKUTdnV3Nxb2RleEF0c20vMmEvaDVrZG82dUUzMWlCCjZDN0N1L1R5ZzNoNGhQaHZmZ2lwVmpnMUFGUGpKQ3F6NlNWckdaNEF4UnNPNk5oNW5lWndGOGE3djhucHc5MWUKM21oWWVXUmlpTWhKQUhvdjR0ZmNWU1dPWElXTUNLQ0RBSm5iTWZxOXZmanN6MEwyV1htUGtUUzJHSzg5WllmVQpjWVd0TTVDSmkxOUh0dFg2bGo0Rmk5VmxzaGoyaEVyeVhlZGF6NGo4Tkg1ektndVNTcVNCU2VrUDdWL3NTd2NECm1nUXA1UWxVWXFXYm4vRGJDSFcyb1M2UFBvWTh5UHR4T0RxNW5KT3E2VTdhRENWcVdVbTFBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVVvUDdHWnRubE9PbHBYL0VhakdSZmhPclQ3bDB3SHdZRFZSMGpCQmd3CkZvQVV3SzdCTC85b2hFUTdpWm5STHphUER6Z1RzTjR3Y1FZRFZSMFJCR293YUlJcmFXNW5jbVZ6Y3kxallXNWgKY25rdWIzQmxibk5vYVdaMExXbHVaM0psYzNNdFkyRnVZWEo1TG5OMlk0STVhVzVuY21WemN5MWpZVzVoY25rdQpiM0JsYm5Ob2FXWjBMV2x1WjNKbGMzTXRZMkZ1WVhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKR0ZoTlRZNE4yTTRMV0ZtT1RFdE5HRTVZUzFpT1dFd0xUWTVaVGswT0RBeVpUVTIKWWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUg3czd3V3JWMUo3dWMzRVpUY3V5MjhFbmt2cHA2SStoOUtFeQpDbExXRHhFeHoxWEVsVW9qWkRHU21acUhGNWUzcnVSaittQ2NYWkwvaE5VbE9zVmoraTJFd1ltTTdGdU9YMXkrCkxrVjN3cU03MVhJcFhWNURhZndON2RxTWo4T2pibTR2MlplSkxyVDJQM25xWFlLRmdFMTJsR1BnYk5mem8vMUYKM2UrMkcvelFWUnlsM01yVzFoL1BqNGZPVjk5L3ExZ0YxQldpNHJ6czU5R29iRy9iRWZmSFlsZmcwbWkyQUx5KwpFb1hTNVg1Q3FBMnJrTjVxMjhRNVdLMEV2QnhBclI0aXhwNmRHSGNSOE5PbUlpRGp3RzZPclhTVDVXWTJvMkt2CmIrYTVSR1JJczFJTU96SVdYbzdYdU40eEVmalRHSTBOcEUwY3ZuT0RRVXZscFdwOFpBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlLVEt4d3RwS3JHRXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpRd016ZzVNVEFlCkZ3MHlOakEwTWpneE9URTRNVEJhRncweU9EQTJNall4T1RFNE1URmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056YzBNRE00T1RFd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFESGhiQTh5QU9JeThqS29mQk9YenR3UVFrR2xSZER6RFB1Cmg3N3o0cnF1Y1lLSTFSdVJzVTRuYlFWVTJjckRRMnRnVGxTM3ZxODg1aE1LbWFDcnZ4UEFFWTFzYW53ZGRuNUsKTXJaVW1nOUFSMnJxbzlQcGQwZjJzRURyd2Z3amRrU29mcWlBYU43Q2RBQkpFODdGK0VEN1MwbkdxVzZoQ2o0RwpCZUtWa01NWmVvMUQzUGVOdyswNjhFK095WUZWT0ZZdGVPVk16L3E1bERDWk1YemkyQ3BwbUpzTnN2eUR0aVN1Cmtab1JtQndkMkpzc2JZZjJIMXlZRGFZcno1ZVh5N2QvZWFEOEwxcisxZDBJWlFJN05TbkliZnhES1JnTWpDWHEKbk1ZRjY1bDdoM1lSNFBURG5oakI1dG9hM1E3amd1NHV1L0swU1B3a092Sm9pRXZ6dm1wQkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVEFyc0V2Ci8yaUVSRHVKbWRFdk5vOFBPQk93M2pBZkJnTlZIU01FR0RBV2dCVEFyc0V2LzJpRVJEdUptZEV2Tm84UE9CT3cKM2pBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUViOWJJS3l6Q0JZcmRHQXVLLzRZVzkrM3NQR284c3hmRUhKTApzOXd1MEdFeDJGVFRZNE5vZzNKNy9Gb00rTVQvbUdoam5GSURCaStoNTRpeSs3SEMrTnRnTmVNS0daeHl6WitXCmg1UVVjMkRka0V5T2NQWCtjd0dBbjFMMGdHY2dKbWZRdkdveHYxak16eDRsYWNqVHRwZXdqazNxeWM1NlhpeGUKa3F4WHBPUHlLeGxDeEpoV2QxNEQvN3JRZDV6VXI1eDZwRnAycTNkUDZzSk5MZ2Rka2xHT1J1a2FCcnBYWWZhRQpKK0RUb0JzaHdRUk12L3RmTjB2YndvODJRVnU5d2lNZUZCQTlLWWlWZW9TN1NMd3Z4Z0ExT2laQjBlMGpWVGVQCmdHdlR0eHIzeG84VWY0clhHR3gwd1cwb0RoaGVsMnRmNXpRMS9pNjNvMGJ6T0J3TWNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-27T19:18:17Z" service.beta.openshift.io/expiry: "2028-04-27T19:18:17Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: aa5687c8-af91-4a9a-b9a0-69e94802e56b creationTimestamp: "2026-04-28T19:18:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"aa5687c8-af91-4a9a-b9a0-69e94802e56b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-28T19:18:18Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: aa5687c8-af91-4a9a-b9a0-69e94802e56b resourceVersion: "7874" uid: 7906e3e8-ba0d-4602-9104-2937165954bb type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-28T19:12:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:12:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"944f08bf-7fea-4b0d-be21-02037943e4b4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:12:26Z" name: default-dockercfg-rkrph namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 944f08bf-7fea-4b0d-be21-02037943e4b4 resourceVersion: "3388" uid: 71bbc566-cf0c-409d-a551-cf772da0eaae type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-28T19:12:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"647f93fb-8b35-4050-b65d-546d6e84ef63"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:12:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:12:31Z" name: deployer-dockercfg-qvljt namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 647f93fb-8b35-4050-b65d-546d6e84ef63 resourceVersion: "3880" uid: 5edd0695-4cd4-4aad-b8a6-ae82f94516da type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "25857"