--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"70d4f232-29f8-4b74-be08-8fd533cb57d3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:05Z" name: builder-dockercfg-tqdql namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 70d4f232-29f8-4b74-be08-8fd533cb57d3 resourceVersion: "4038" uid: e4104b72-8061-4178-a4f6-56139a019e78 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:03Z" service.beta.openshift.io/expiry: "2028-04-21T18:49:03Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 1b69f370-e4bd-44d9-b7cd-2d76eb12e217 creationTimestamp: "2026-04-22T18:49:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"1b69f370-e4bd-44d9-b7cd-2d76eb12e217"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:04Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 1b69f370-e4bd-44d9-b7cd-2d76eb12e217 resourceVersion: "7900" uid: d2c89aaf-0340-42fd-bcbc-e2211abbf371 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:43:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:00Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f50b0d4-a134-4b9e-841b-adba0e35fa1c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:00Z" name: default-dockercfg-rxjsb namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4f50b0d4-a134-4b9e-841b-adba0e35fa1c resourceVersion: "3511" uid: 10ed0e1d-8542-4a86-8197-8a3427814218 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e17a5308-f7ac-4a3f-9bdd-47a8ee59158d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:05Z" name: deployer-dockercfg-tmbht namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e17a5308-f7ac-4a3f-9bdd-47a8ee59158d resourceVersion: "4042" uid: 731dff13-4347-4a32-ae6f-3b8044db6554 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37360"