--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-18T02:42:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e544c1e5-4432-43b3-9546-5239e6b4a65c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:48Z" name: builder-dockercfg-dt2pl namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e544c1e5-4432-43b3-9546-5239e6b4a65c resourceVersion: "43036" uid: 24a64e6a-f051-4823-98e8-235daa959cbb type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVFVENDQXZtZ0F3SUJBZ0lJVm1MbWpPYkd5ckl3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTRNRFV3T0RBZQpGdzB5TmpBME1UZ3dNalE0TXpWYUZ3MHlPREEwTVRjd01qUTRNelphTURZeE5EQXlCZ05WQkFNVEsybHVaM0psCmMzTXRZMkZ1WVhKNUxtOXdaVzV6YUdsbWRDMXBibWR5WlhOekxXTmhibUZ5ZVM1emRtTXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRE5sVGcxZW1wVytrdHk4enk4bWg4YVdnM0tjWEtNVkl1dAorTCtXUVpQS2lOQUVEcXBSMkRKK0JVaGQ5cjdnZk4wK2ZZQ2R6cVZyVWF1b1VSTytwQmlPRDlBZEpZdDEweXNhCjZ1alpDZ3NZVmNRMUdxMHQrMGFtV2NCSndtenF3bEVKcEJYQUJCcW43U1ZmejJ0VDlQMDNJZXhNSWNYTVBVODAKVzhvQ1VtWTltMTU2S0VGVlRGWHRCcWJDeCs2SVNJZUFRc3NtcXZCaHcxYUlpZytHMUgzMys1OWpKejl5c1Y3VgpNaWVhWGdWcTE2emhrK3M3QWloaW1wOXpLQnJxYUw3MUZUc0gyYUJkeGRmSFNJMTRpUWVQa3k3OFYvVUxQRVJJCm1pOFV4QlJHcXkyeEpmNVZYamc2YkEvVklWekpLbkhEVVpxL3lWRk53VzBtem5CNHNmTDNBZ01CQUFHamdnRWgKTUlJQkhUQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3RXdEQVlEVlIwVApBUUgvQkFJd0FEQWRCZ05WSFE0RUZnUVV2MStwQ2hXQ2taSnNyRE50UzhBNG9MV2lYMkl3SHdZRFZSMGpCQmd3CkZvQVVCSG11N3lRSTlvYnNEakY5ZVRUbkZzRDA1cWd3Y1FZRFZSMFJCR293YUlJcmFXNW5jbVZ6Y3kxallXNWgKY25rdWIzQmxibk5vYVdaMExXbHVaM0psYzNNdFkyRnVZWEo1TG5OMlk0STVhVzVuY21WemN5MWpZVzVoY25rdQpiM0JsYm5Ob2FXWjBMV2x1WjNKbGMzTXRZMkZ1WVhKNUxuTjJZeTVqYkhWemRHVnlMbXh2WTJGc01EVUdDeXNHCkFRUUJrZ2dSWkFJQkJDWVRKREZoWVRsbVpqRTFMVEprTUdZdE5HWXhPUzA1TUROaExXRTVOak5tWXpjM09HTmkKWVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVY1dk9DZy8vTWNmclZHMUgxOVplTjFoNnE0aHp1Rkhqc3E1Ywo5bzVxTW5nNHg2N2pCa1FhdW8vVzZ2aW0wd0Q5NUFRdVg3MVV4MHM2eEhsWFNyUEZPeWcwSXpyZVNJMVBPS2laCmRhWWcvcVFNZUNkM2NmeFZhbElEZjNGSko4cmNESndpdnEyK0V1Qm1iNXZLMkVabnVnakR5bXl0TEZ4TEVpYkcKQXEwbjlJamNnZUllYkRJVmlZM0g3bGF1Ym5LUUdTTnFvUFBqSVZjRmw1VWtXdm52ak4rcmVweC9zczEwandjMQpoa2lhcG94NWNYWE1IbndQaEZqc3UzUFRFNmdjWlNxeWw2KzU3NnV5SE93dEdDUlRMVHRLRWhvL2JKbUhwcFNICk9IZCt0MkRXdC9NcUowbFBIRW5hV3o4UTBtUEhsOVZDODNRSmxpL21TMHZWczVIUjlnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlacnI0WUVhMExrVXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRNE1EVXdPREFlCkZ3MHlOakEwTVRnd01qUTRNamRhRncweU9EQTJNVFl3TWpRNE1qaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBPREExTURnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFETVR5OEx4NXViK1FGVkM5elBtZlhiTkhaWUR0MS9jdVczCnVJUmFPMDdoeEJVSE5QSlk4dmd3TjN0YmVkSDVUYlN4VzN2OTdkN3VQYWJqSTNMVXk1S2FGSFYvWkFGcENCWHcKTTN2L3VJMjNYYmhmTjNER1NkWkJ5M1B2QnlrQnVERlJDOG04MTBiWmx1b3pZYkkrcXN3UGlpVGVrYXVkREZzaQpmTW1ydTU3SUpMSXJZTGU2UlhJYnB4UHhSNEw0OXlCK2FuVk83eHhOTVo5Wi9KZFRZK01nRGxqc3VpUE9MRWlJCnhkZGR0QUlWdEpVWEdaaHN2b1B4dzFKcVRQeVhzS29VeCtEbjMwamNDWTFINGlnQ2NoVDZRWHc1T1Y5Rm1MQkEKM3RKZUU0OWZZRUNaUmhxK3NSVXNJV1BTSjVNY0M5b3V5aVJIemlkL3htUTBZbFQvNkhJQkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUUVlYTd2CkpBajJodXdPTVgxNU5PY1d3UFRtcURBZkJnTlZIU01FR0RBV2dCUUVlYTd2SkFqMmh1d09NWDE1Tk9jV3dQVG0KcURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVU4Q0F0OUNsaDFacm12ZGFzNk8vR25yVUVIVWx5RzFWYjQ4VAp1SEdDV2xIRi94Q0lvV2VkdmVia3JLVWdvY1JIUVpwaE1XMjhneTk5QU5mQmF5a1dlVGF4MTkxM2cyZW00b2diCmU1UmZ2NFoyOTA2NW85NE1VM1ZYaEI1MWlua2g1VUE4eFJSb1VvNGpxRG9NaTNmaVIxTHBuM1ZxbWpEa1EyVksKeTZDMjE4V0tYdWUrT054N3YwSXFxWThGSVlOWEhmTEZnZW9LZldsb01vRlQ4UzRPSDNmOE9wcTA4a0NCTjZnZAo5SFZqbnJZN3Fsa0lnNzBTTDRZbzhpUVZYZUZCU2Q0cVVDTUROSW9YZ1h1WDBuYWJBY2NqTzNKWTNpeUprRkFLCktET0t3aEhPVnpwaldVWkVsalAxNTQ1TzhQTkdwcml2M3p0eUFRWDlHb1RLSTBSblFnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-17T02:48:36Z" service.beta.openshift.io/expiry: "2028-04-17T02:48:36Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 1aa9ff15-2d0f-4f19-903a-a963fc778cba creationTimestamp: "2026-04-18T02:48:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"1aa9ff15-2d0f-4f19-903a-a963fc778cba"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-18T02:48:37Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 1aa9ff15-2d0f-4f19-903a-a963fc778cba resourceVersion: "7742" uid: 544d5ea5-adce-49ab-b474-dfacb7464717 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-18T02:42:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6156f092-68ce-4649-9d36-f0b085085f9e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:43Z" name: default-dockercfg-dwvkt namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6156f092-68ce-4649-9d36-f0b085085f9e resourceVersion: "42839" uid: fca0547e-2f2a-463e-bd5f-38ac9c048746 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-18T02:42:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a94243cd-d8eb-43d8-a61e-d92e42d441c9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-18T02:42:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-18T03:18:48Z" name: deployer-dockercfg-8x8rt namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a94243cd-d8eb-43d8-a61e-d92e42d441c9 resourceVersion: "43050" uid: dd571fe8-8ba1-49d9-a64b-1d2cf95b1c34 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46186"