--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:14:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c21bd183-a7a6-45e1-982d-df917256d7b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:21Z" name: builder-dockercfg-vfglc namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c21bd183-a7a6-45e1-982d-df917256d7b9 resourceVersion: "4192" uid: 0adeb25b-14c2-4694-a2ec-a58b6730bcf8 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:17:19Z" service.beta.openshift.io/expiry: "2028-04-23T21:17:19Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 0ce8f47b-c1f4-47f5-acdf-0d820ec9884f creationTimestamp: "2026-04-24T21:17:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0ce8f47b-c1f4-47f5-acdf-0d820ec9884f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:17:20Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 0ce8f47b-c1f4-47f5-acdf-0d820ec9884f resourceVersion: "7029" uid: 42c842f5-094e-4792-a968-e8175e496d93 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:14:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ac5b5549-cf73-420f-a212-ab4bdad7c540"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:16Z" name: default-dockercfg-6g56g namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ac5b5549-cf73-420f-a212-ab4bdad7c540 resourceVersion: "3690" uid: f18d796f-7287-49da-8c6b-fe591a9fd59d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:14:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:14:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4ae439a-78eb-41ce-a1aa-42091110fbbb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:14:21Z" name: deployer-dockercfg-txg9w namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c4ae439a-78eb-41ce-a1aa-42091110fbbb resourceVersion: "4191" uid: 3edf97fc-aba6-471d-b4d2-ec586418c5fa type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20612"