--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-12T13:35:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bbad9f28-ad73-474b-9c01-f6de14de7ffd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:29Z" name: builder-dockercfg-c9s2t namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bbad9f28-ad73-474b-9c01-f6de14de7ffd resourceVersion: "4364" uid: 1bb11a19-1f8d-4a12-a7da-3b35a33c84ab type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/ingress-canary with hostname ingress-canary.openshift-ingress-canary.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: canary-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T13:38:44Z" service.beta.openshift.io/expiry: "2028-03-11T13:38:44Z" service.beta.openshift.io/originating-service-name: ingress-canary service.beta.openshift.io/originating-service-uid: ead7d3d7-ece8-4369-9d55-990ed6c7f0cd creationTimestamp: "2026-03-12T13:38:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ead7d3d7-ece8-4369-9d55-990ed6c7f0cd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T13:38:45Z" name: canary-serving-cert namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: Service name: ingress-canary uid: ead7d3d7-ece8-4369-9d55-990ed6c7f0cd resourceVersion: "6771" uid: b870f6a5-8222-4030-8c48-b619ec1e5e9f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDgwNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4775561c-d042-4bdf-af0d-f41642b6a0d9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: default-dockercfg-6llcj namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4775561c-d042-4bdf-af0d-f41642b6a0d9 resourceVersion: "4127" uid: 9cdbdbca-0235-4674-abba-5d242fece2db type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDgxNyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-12T13:35:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc6e879f-e9e4-4953-835b-ff86351f1099"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:29Z" name: deployer-dockercfg-gvgc9 namespace: openshift-ingress-canary ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: dc6e879f-e9e4-4953-835b-ff86351f1099 resourceVersion: "4365" uid: f0bac4f3-39c7-4d69-a6a3-6ea849935208 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21973"