--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2025-10-14T13:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3f2f563c-c6cf-421a-be6e-33ec65542f2b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-10-14T13:12:09Z" name: oauth-openshift-dockercfg-5vqgl namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 3f2f563c-c6cf-421a-be6e-33ec65542f2b resourceVersion: "12667" uid: 3355cb21-f26e-4a23-8cea-8e4dce103f08 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-10-14T13:08:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2025-10-14T13:08:40Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "7345" uid: e025388e-dd3f-4919-8781-a1895a1922c1 type: Opaque - apiVersion: v1 data: apps.ocp.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2025-10-14T13:08:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.ocp.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2025-10-14T13:08:53Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "8159" uid: de06472c-3c6d-4b38-b3c5-4823090ad321 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJRmcyQXRCazRkVWt3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjMk1EUTBOekk1TWpBZQpGdzB5TlRFd01UUXhNekE0TkRoYUZ3MHlOekV3TVRReE16QTRORGxhTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUE3aVJBQUZBZVM0bHgxWjR6WkxSektLbEhSVDAyWjAySApKditoK05tUmIzNUtvckxLVCtaUWtJNnRlbE5wL2FWZFA4NVVwb3V0cFRhQmJHc1hERThxMG02WHBJNE1WemlJCmZ1MUVoTjhFMjkyQWtCV0E2TEd6THNBZWxNYWxjbnc4dG9tWUNZM2RBSFlqeDJ3Q1JEd0I3a2F4SHFVMFNwWnEKeGxoVlc2M2JwZS9Ya3Z5Vm5iT3V0Y2Eyc3RyWkhVeHBNZEg1dHdFaWZYNUx2ZnU5RFluTUgrUkNNMkZvWVZMbAo5MEkzM0QxN2JTcnE4OXViT0xpTGFMUGtqR0EvaUZNcFBuSjdvcDhqcjBCeDdWN0pxN2x3b0c1OVRRQkt0MHZuCnRyN1BIM2QrL3A2eVhDM0Y5VThXRmpFRk1ZZDkvMVZERUUzZjRWWENVV0d3eWRqYzdsMnA2UUlEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGSDBTWUNzaHJGOHpYamluOHVIUHQ3b2hoNzdGTUI4R0ExVWRJd1FZCk1CYUFGR1FYUG1KUmkrUWh3cHViSkJ4b1YwR2wrcEl5TUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkRRNU1qVTFZV0psTFRrell6TXROREF3WmkxaU5XUmpMV1l3TmpNME5XVXkKWVRKbU5EQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFUV0ZRNXJVRm82UVZkUzZFRjUxU1BJSHlCcW9CS3JlaApmclpneHk5NWZJRjZvWkFOVWZUOXZnTkpVQ1dBM2pNTXc1anphVWVSTFAwbVZYUVpCd2d3SG5mKzF3ZXdTMnltCmQ3QkdCa0dZYTdQdHhtK1V3ODM0Y08xYW1VUHJsZUEwQWZneExVcXBuak54OGVEa0NCZFJnWWRUR3o0dXhyemgKci9DL21NNkJmUFNtWVlSSkFONUpKRmZHQmVzMFNYY0g5QlZMejh2RjRBUGtiL21vT295L0ZYU1hsOHVwMlZ2aQp0a0xUYUhGTUpWeGZsNTFaSEdnb25nTk9HeFRDbU9GY0o4RkNZOVBadmFCMkErREFwZ3JCTk4wRXpKTHhYOVZuCjh6MTR4dExjbEZ6NFVyN2MzZzBDa0ZyVGlGVlZMKzM5V3BhY0RFYThSK0VOZUZuWm1mQzJQUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJSkpXTm9ZM2ZQdWd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjMk1EUTBOekk1TWpBZQpGdzB5TlRFd01UUXhNekE0TVRGYUZ3MHlOekV5TVRNeE16QTRNVEphTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOakEwTkRjeU9USXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFF3WUQzazhFSXA5ZmdlbUVoek1vVlE1bnlob2x3OExWUApOVXhUNjlONmdXdnFDbGdhMlI1SEEwSVkxd2Uvbk5OQ2xCejQ1TDF4RHJYNHZrQUF5THYwa3p6TndYeENleGhiCkxLNnRaQU0vL3IvTHgvMW5mclJNL1JrUENBNzNPRVRYRWZsanFaV043RkE0NFQ4NEhXUllRS0xweDZ4Zzk4aU0KeW80Y2wyUnhkellwV0M0L09XTXlEbVVjemJhcmoxNXV4eTdUMndOVzZmVjBBM2ZZeEZmVktOVGRXK2FhYytGWQpFTllrbU5XbE9JNVBZWi90dFB3NzhBQk1YdEVBQ0FuV3U2WTJ0Z3F4Smk3M09VKzJITzRtUnhibStHdGMvNDRaCmZZcDREZExuN1ZlZ25vb1lVQWVlanJMWUdTNkd0dlkyV3BTdW0rb3NTUjMyZFJBc1dKOEhBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlJrRno1aQpVWXZrSWNLYm15UWNhRmRCcGZxU01qQWZCZ05WSFNNRUdEQVdnQlJrRno1aVVZdmtJY0tibXlRY2FGZEJwZnFTCk1qQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFnK2VXeFZ2WHpVNk1PZXVETFlDa3ZhQ0NkeVNKbHRjZkVJckMKUGtlaHdCb2xPTTdHLzZSWFhrTXdrbXJiMU1XdEFySXVyRkF2RnRXREJnbk5sNzdRUi9qY1NhK2NncTIzWm91dApaTksvSStXT1U4OTRYT1pUU2pzMElhajZMb2gyTDF4MlFQd2I4YXozWTE0bWRTOXU5MDJ6bGJiSHp3MU12dFMzClUyL1p6dHUxRzd5UHBwcHA4M3E2Yk1IRlpQYVRLNGt1eGtXeXd2dG1YZXg3ZVFmaC9LU0RMQm5LZ1dBcFJlQk4KYkpRcXNPWDNXckJxVXFqVmlQOFdDbk9wWC9JWEVjZExoUGd2TnBmSEZ0QzhoUkR3dVV3djJaUW5zWVdJSG1sSgphVGNsSnZhZXFZWkpWcmE0c3BnN0pxRXlTNlpDdVZ6K254T1F0QzlSR2JlamtmRWdhZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2027-10-14T13:08:49Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 49255abe-93c3-400f-b5dc-f06345e2a2f4 service.beta.openshift.io/expiry: "2027-10-14T13:08:49Z" creationTimestamp: "2025-10-14T13:08:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"49255abe-93c3-400f-b5dc-f06345e2a2f4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2025-10-14T13:08:49Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 49255abe-93c3-400f-b5dc-f06345e2a2f4 resourceVersion: "7929" uid: d5509d0f-80ee-4396-a4a1-8d9f4e8ff086 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-10-14T13:17:49Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2025-10-14T13:17:49Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "16458" uid: 545d2f32-1e70-4a26-a5ef-bc190446480f type: Opaque kind: SecretList metadata: resourceVersion: "60994"