--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:54:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3fe5bc27-aa9c-471c-9ad8-205720f4fa57"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:24Z" name: builder-dockercfg-4pt8d namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3fe5bc27-aa9c-471c-9ad8-205720f4fa57 resourceVersion: "37762" uid: 980e129d-54e9-4a59-9fef-fd795ffd832f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:00:47Z" service.beta.openshift.io/expiry: "2028-04-15T14:00:47Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: e5ec38d3-1770-45b8-8718-fc6f7a2e178f creationTimestamp: "2026-04-16T14:00:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e5ec38d3-1770-45b8-8718-fc6f7a2e178f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:00:48Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: e5ec38d3-1770-45b8-8718-fc6f7a2e178f resourceVersion: "7656" uid: 01057716-68f7-4057-a224-969ba80a91f5 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:54:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ead63c3-7276-4013-9da7-0f71d5d6e05d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:22Z" name: default-dockercfg-pt57w namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9ead63c3-7276-4013-9da7-0f71d5d6e05d resourceVersion: "37531" uid: 722a236f-c171-42e3-ae99-04702e89896a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:54:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"651055b8-6d18-451c-a365-f4d4c2a014f4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:54:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:31:24Z" name: deployer-dockercfg-j6fmw namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 651055b8-6d18-451c-a365-f4d4c2a014f4 resourceVersion: "37763" uid: 6f64f5c9-3d1a-45d6-bc3e-ae09218de092 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39852"