--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:20:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9a72533e-d46e-4c94-befd-c205e64baf47"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:12Z" name: builder-dockercfg-w2wgj namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9a72533e-d46e-4c94-befd-c205e64baf47 resourceVersion: "4358" uid: 0e351131-5c1c-4b79-a6b0-90cb1a401b27 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:26:38Z" service.beta.openshift.io/expiry: "2028-04-21T19:26:38Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: c8dfa2c2-ee69-4513-902e-219bfa68342d creationTimestamp: "2026-04-22T19:26:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c8dfa2c2-ee69-4513-902e-219bfa68342d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:26:39Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: c8dfa2c2-ee69-4513-902e-219bfa68342d resourceVersion: "7813" uid: f0d5548b-27fe-4513-ad31-a45d9001b6d6 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:20:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b7227a4-435f-40e5-8120-2549bf649330"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:09Z" name: default-dockercfg-76gtl namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4b7227a4-435f-40e5-8120-2549bf649330 resourceVersion: "4200" uid: be0f92ba-a994-408d-a9cb-74803ad43388 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:20:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"14873450-08b6-47bd-8ecc-5ccceb5099bd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:20:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:21:12Z" name: deployer-dockercfg-52rt2 namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 14873450-08b6-47bd-8ecc-5ccceb5099bd resourceVersion: "4359" uid: b1e75dff-7dfc-45f7-8a2d-cccdfa5e41fa type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "36031"