--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T04:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7d43d7be-0e91-4ed1-8c1a-193944e0dd91"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:26Z" name: builder-dockercfg-h7mzn namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7d43d7be-0e91-4ed1-8c1a-193944e0dd91 resourceVersion: "4171" uid: 104a6e01-9c2b-442e-8ef4-7c8b3ca774f0 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T04:40:56Z" service.beta.openshift.io/expiry: "2028-04-20T04:40:56Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: c9f9fc21-2700-4dad-a176-2509bd681a22 creationTimestamp: "2026-04-21T04:40:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c9f9fc21-2700-4dad-a176-2509bd681a22"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:40:57Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: c9f9fc21-2700-4dad-a176-2509bd681a22 resourceVersion: "7754" uid: 751c81b9-40d7-4cf4-8ea8-688d2a1e531a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T04:35:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66ef3406-a42e-474b-83a1-d9766a3a406b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:21Z" name: default-dockercfg-ljx4n namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 66ef3406-a42e-474b-83a1-d9766a3a406b resourceVersion: "3666" uid: 24a6252f-067e-41ab-84da-a694624cce5d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T04:35:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:35:25Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"32fa43e2-b452-40eb-a19e-fb8d9c331b6a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:35:25Z" name: deployer-dockercfg-k9d9d namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 32fa43e2-b452-40eb-a19e-fb8d9c331b6a resourceVersion: "4170" uid: 9383d6b8-c48e-4381-ae91-65eba5ee522c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26636"