--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T21:34:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6b6a4b32-25e3-4718-a631-2848c051082e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:10Z" name: builder-dockercfg-dwt8j namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6b6a4b32-25e3-4718-a631-2848c051082e resourceVersion: "4014" uid: c4b36a6e-e532-4d74-abd1-c3df3d628c85 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T21:37:29Z" service.beta.openshift.io/expiry: "2028-04-16T21:37:29Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 64b51c06-e5da-44bb-9e97-5030925f6cc7 creationTimestamp: "2026-04-17T21:37:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"64b51c06-e5da-44bb-9e97-5030925f6cc7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T21:37:30Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 64b51c06-e5da-44bb-9e97-5030925f6cc7 resourceVersion: "6859" uid: ae7473a6-0d23-4f62-861c-9ee0a1b536f9 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T21:34:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e0c1f2bb-feea-48b4-bb5b-9cf476ffb8e6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:06Z" name: default-dockercfg-m9tzd namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e0c1f2bb-feea-48b4-bb5b-9cf476ffb8e6 resourceVersion: "3425" uid: b8179ce9-235d-4d41-8727-95cbd068a241 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T21:34:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T21:34:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4dfc10f0-b395-4cc7-88b6-1cf7d215b9ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T21:34:10Z" name: deployer-dockercfg-j4n5q namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4dfc10f0-b395-4cc7-88b6-1cf7d215b9ad resourceVersion: "4013" uid: d6de2573-811a-4994-88ff-c3f095ea5c93 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40919"