--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T16:19:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"267a3275-87be-48a9-ab2a-409ab6c0e3bd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:45Z" name: builder-dockercfg-7bfgr namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 267a3275-87be-48a9-ab2a-409ab6c0e3bd resourceVersion: "3810" uid: 8c07f672-dcf7-4303-b8c9-b92a55be3a8c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T16:25:47Z" service.beta.openshift.io/expiry: "2028-04-19T16:25:47Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: ceaa7062-3a61-40d3-8f83-fe146da38dfc creationTimestamp: "2026-04-20T16:25:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ceaa7062-3a61-40d3-8f83-fe146da38dfc"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T16:25:47Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: ceaa7062-3a61-40d3-8f83-fe146da38dfc resourceVersion: "7867" uid: 91ceb6ff-62a3-4f7e-ae54-3a15b67d86d3 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T16:19:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4fb75a70-c87a-4da0-a94f-60c98dde3920"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:40Z" name: default-dockercfg-cmjpg namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4fb75a70-c87a-4da0-a94f-60c98dde3920 resourceVersion: "3188" uid: c6efd046-17fe-448d-923c-1b0a2735286f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T16:19:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"16d89129-a08c-49bd-b16b-e45516ef5ceb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:45Z" name: deployer-dockercfg-wgp69 namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 16d89129-a08c-49bd-b16b-e45516ef5ceb resourceVersion: "3807" uid: 5e64af6b-f2c2-4547-9d28-616a1b41de36 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28000"