--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T09:04:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"11ddc775-1143-45a5-a1c6-52d794f2f550"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:22Z" name: builder-dockercfg-mb276 namespace: openshift-route-controller-manager ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 11ddc775-1143-45a5-a1c6-52d794f2f550 resourceVersion: "14142" uid: 3e7d702d-48d0-46a9-abbe-86c5215ce557 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T09:04:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f31f472-f4dd-43ba-8175-a221848102b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:28Z" name: default-dockercfg-g5wgz namespace: openshift-route-controller-manager ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4f31f472-f4dd-43ba-8175-a221848102b9 resourceVersion: "14576" uid: bb19c3e1-91c8-4c86-bd70-b8bc82b12f91 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T09:04:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b12579a-9c23-40df-a448-d60e3fa819d6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T09:04:21Z" name: deployer-dockercfg-tz46j namespace: openshift-route-controller-manager ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 0b12579a-9c23-40df-a448-d60e3fa819d6 resourceVersion: "14026" uid: 1acf39b3-19bc-47c9-bf77-b203195121bb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: route-controller-manager-sa creationTimestamp: "2026-03-18T08:49:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"212d4092-a276-49a8-bb09-c7222e5d06e8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T08:49:11Z" name: route-controller-manager-sa-dockercfg-8zgz4 namespace: openshift-route-controller-manager ownerReferences: - apiVersion: v1 kind: ServiceAccount name: route-controller-manager-sa uid: 212d4092-a276-49a8-bb09-c7222e5d06e8 resourceVersion: "7686" uid: 690665c2-3d05-4a1f-9b45-b68ed60e623b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/route-controller-manager with hostname route-controller-manager.openshift-route-controller-manager.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T08:48:58Z" service.beta.openshift.io/expiry: "2028-03-17T08:48:58Z" service.beta.openshift.io/originating-service-name: route-controller-manager service.beta.openshift.io/originating-service-uid: 622e2dc0-e305-4b0b-ade1-844a27e0845e creationTimestamp: "2026-03-18T08:48:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"622e2dc0-e305-4b0b-ade1-844a27e0845e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T08:48:59Z" name: serving-cert namespace: openshift-route-controller-manager ownerReferences: - apiVersion: v1 kind: Service name: route-controller-manager uid: 622e2dc0-e305-4b0b-ade1-844a27e0845e resourceVersion: "6380" uid: 1cfc0e98-553e-429b-9d6e-58fe0dabaff6 type: kubernetes.io/tls kind: SecretList metadata: resourceVersion: "19001"