--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:47:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f200452c-c6c6-412e-9430-85e8949cf114"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: builder-dockercfg-t5tf9 namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f200452c-c6c6-412e-9430-85e8949cf114 resourceVersion: "4281" uid: 80142a08-c64e-42ef-ab45-5ec5356ebb84 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:52:58Z" service.beta.openshift.io/expiry: "2028-04-16T20:52:58Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 4fc37fb9-0f4c-4bfd-baee-a33c045ca8c5 creationTimestamp: "2026-04-17T20:52:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4fc37fb9-0f4c-4bfd-baee-a33c045ca8c5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:52:59Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 4fc37fb9-0f4c-4bfd-baee-a33c045ca8c5 resourceVersion: "7693" uid: 10da8841-2153-4b52-a2d5-8a8d39c2af65 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"771cfc5a-1200-4386-a835-55dddc387a63"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: default-dockercfg-jvfcm namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 771cfc5a-1200-4386-a835-55dddc387a63 resourceVersion: "4124" uid: a1e04af3-7ac8-4849-81e2-da77de5edc81 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:47:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d4f6975b-4e01-4569-8a54-2c24e44759e5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: deployer-dockercfg-swrht namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d4f6975b-4e01-4569-8a54-2c24e44759e5 resourceVersion: "4280" uid: ccb6cf0a-e250-4a52-a385-d3a7abec6d65 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26311"