--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T15:31:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"379673d8-794e-4ea2-b746-55ff4c21ca26"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:55Z" name: builder-dockercfg-h8gbk namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 379673d8-794e-4ea2-b746-55ff4c21ca26 resourceVersion: "4216" uid: bfb59dc4-a910-466d-9204-62568dfb4352 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T15:37:31Z" service.beta.openshift.io/expiry: "2028-04-20T15:37:31Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 9605e374-9762-4bd9-8666-2727e97ef15b creationTimestamp: "2026-04-21T15:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"9605e374-9762-4bd9-8666-2727e97ef15b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T15:37:32Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 9605e374-9762-4bd9-8666-2727e97ef15b resourceVersion: "7779" uid: e3d093b7-967b-4fa5-a3ca-2b2f3da26765 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T15:31:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61df018a-4130-4b87-b724-f0c39be1512a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:51Z" name: default-dockercfg-xkwb5 namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 61df018a-4130-4b87-b724-f0c39be1512a resourceVersion: "3514" uid: f0a19248-f4cf-4912-aca2-05c3fdb9d29b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T15:31:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"044ffaa7-41d1-4530-9370-56d8cc9e3687"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:55Z" name: deployer-dockercfg-lqsft namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 044ffaa7-41d1-4530-9370-56d8cc9e3687 resourceVersion: "4217" uid: df489409-f2dc-4a0e-8f0d-4afcbcc03344 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37118"