--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T07:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7a42b812-a452-4894-820b-25c24d5ae1c7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:16Z" name: builder-dockercfg-phkz2 namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7a42b812-a452-4894-820b-25c24d5ae1c7 resourceVersion: "4136" uid: 4a0f5155-1398-41d2-908c-efcf5372d5ce type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T08:04:44Z" service.beta.openshift.io/expiry: "2028-04-16T08:04:44Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: 7692b1dd-88be-49d0-8c82-2db9e39cead3 creationTimestamp: "2026-04-17T08:04:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7692b1dd-88be-49d0-8c82-2db9e39cead3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T08:04:45Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: 7692b1dd-88be-49d0-8c82-2db9e39cead3 resourceVersion: "7688" uid: 748d82d7-ec40-4b6c-a967-144ee58b5b76 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T07:59:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fe6b9203-dfc7-42ea-ad37-e68fae24a855"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:11Z" name: default-dockercfg-x9bwm namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fe6b9203-dfc7-42ea-ad37-e68fae24a855 resourceVersion: "3616" uid: c982124c-efe2-49b5-b48c-67e6ff60fe67 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxOCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T07:59:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"29e3e5fe-d905-41e1-98be-7e31c5a46cfc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T07:59:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T07:59:16Z" name: deployer-dockercfg-546wm namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 29e3e5fe-d905-41e1-98be-7e31c5a46cfc resourceVersion: "4137" uid: fdedd6be-e8cf-4294-878d-ff73e4b7cd9a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "13386"