--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:25:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"94d8bdca-0bf6-44eb-a8b1-40f26f17c04e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:10Z" name: builder-dockercfg-dzl4k namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 94d8bdca-0bf6-44eb-a8b1-40f26f17c04e resourceVersion: "4265" uid: bc885fbc-ef66-4591-a40f-76784a5664c1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:27:59Z" service.beta.openshift.io/expiry: "2028-04-23T21:27:59Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 649a9052-db8e-4b0a-a1fd-a9960fb4d127 creationTimestamp: "2026-04-24T21:28:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"649a9052-db8e-4b0a-a1fd-a9960fb4d127"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:28:00Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 649a9052-db8e-4b0a-a1fd-a9960fb4d127 resourceVersion: "7032" uid: f56058fc-f706-4c60-b640-67bab65e4ddd type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:25:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"29a529a5-ed25-405c-97d7-0e8dc7545235"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:05Z" name: default-dockercfg-j9cg5 namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 29a529a5-ed25-405c-97d7-0e8dc7545235 resourceVersion: "3728" uid: 6aa1a0e0-39de-42be-86ab-9a2eea9c14b9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:25:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:25:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f8544a3-dc66-4f73-bb3a-d6a5fee2b00d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:25:10Z" name: deployer-dockercfg-4nfds namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4f8544a3-dc66-4f73-bb3a-d6a5fee2b00d resourceVersion: "4260" uid: 3efe7b14-849a-4109-a4bd-f9433a5628a8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20535"