--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-13T10:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7dfec3ed-7e75-4fe0-9742-884a73255d2b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-13T10:37:32Z" name: oauth-openshift-dockercfg-kkkpw namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 7dfec3ed-7e75-4fe0-9742-884a73255d2b resourceVersion: "9761" uid: 6f830970-3bec-4ef7-8518-c363ffe92acc type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-13T10:36:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-13T10:36:38Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6369" uid: 43e53578-7fd6-4126-bbad-c4ba0b5bdd20 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-13T10:36:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-13T10:36:43Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6666" uid: d45d66cb-6780-4292-b581-5e4d6ffa87e5 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-12T10:36:46Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 27fd0ac0-bdf4-4011-9e72-69fac428700e service.beta.openshift.io/expiry: "2028-03-12T10:36:46Z" creationTimestamp: "2026-03-13T10:36:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"27fd0ac0-bdf4-4011-9e72-69fac428700e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-13T10:36:46Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 27fd0ac0-bdf4-4011-9e72-69fac428700e resourceVersion: "6784" uid: c4206d3e-b387-4c24-9057-fa899ac00b7a type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-13T10:41:40Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-13T10:54:58Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "18375" uid: 8d3a1efc-114d-4ca7-8be7-5f945a881117 type: Opaque kind: SecretList metadata: resourceVersion: "21545"