--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "3" operator.openshift.io/rvs-hash: RFMlPZQpRaEUDUNVtuY_08Tt9FklU8AB1A3F4i7ed4nVDEicjPz3irw0gmPpGFLJwPfd-83ew_8t0ATZjcI_qg operator.openshift.io/spec-hash: d9b7e596be2e04cb989c2b6bf6c4d0ba57e0f32cfe2c20c4c3a0f19c5f814ad0 creationTimestamp: "2026-02-19T03:26:17Z" generation: 3 labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: 55d5bff6 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/rvs-hash: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"cee91e96-a0fb-497c-a8cf-ab0aea39814b"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:operator.openshift.io/bootstrap-user-exists: {} f:operator.openshift.io/rvs-hash: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:namespace: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"oauth-openshift"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":6443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-session"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/log/oauth-server"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/audit"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"audit-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"audit-policies"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-cliconfig"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-ocp-branding-template"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-router-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-session"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"v4-0-config-user-template-error"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-login"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-provider-selection"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-19T03:26:30Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-19T03:26:30Z" name: oauth-openshift-55d5bff6 namespace: openshift-authentication ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: oauth-openshift uid: cee91e96-a0fb-497c-a8cf-ab0aea39814b resourceVersion: "17583" uid: da788188-6e30-4e11-b948-0b26b47ba711 spec: replicas: 0 selector: matchLabels: app: oauth-openshift pod-template-hash: 55d5bff6 template: metadata: annotations: openshift.io/required-scc: privileged operator.openshift.io/bootstrap-user-exists: "true" operator.openshift.io/rvs-hash: RFMlPZQpRaEUDUNVtuY_08Tt9FklU8AB1A3F4i7ed4nVDEicjPz3irw0gmPpGFLJwPfd-83ew_8t0ATZjcI_qg target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: 55d5bff6 name: oauth-openshift namespace: openshift-authentication spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: oauth-openshift oauth-openshift-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - | if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then echo "Copying system trust bundle" cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem fi exec oauth-server osinserver \ --config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \ --v=2 \ --audit-log-format=json \ --audit-log-maxbackup=10 \ --audit-log-maxsize=100 \ --audit-log-path=/var/log/oauth-server/audit.log \ --audit-policy-file=/var/run/configmaps/audit/audit.yaml command: - /bin/bash - -ec image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3167ddf67ad2f83e1a3f49ac6c7ee826469ce9ec16db6390f6a94dac24f6a346 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: oauth-openshift ports: - containerPort: 6443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 50Mi securityContext: privileged: true readOnlyRootFilesystem: false runAsUser: 0 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/audit name: audit-policies - mountPath: /var/log/oauth-server name: audit-dir - mountPath: /var/config/system/secrets/v4-0-config-system-session name: v4-0-config-system-session readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-serving-cert name: v4-0-config-system-serving-cert readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-service-ca name: v4-0-config-system-service-ca readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-router-certs name: v4-0-config-system-router-certs readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-ocp-branding-template name: v4-0-config-system-ocp-branding-template readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-login name: v4-0-config-user-template-login readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-provider-selection name: v4-0-config-user-template-provider-selection readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-error name: v4-0-config-user-template-error readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle name: v4-0-config-system-trusted-ca-bundle readOnly: true dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: oauth-openshift serviceAccountName: oauth-openshift terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: audit name: audit-policies - hostPath: path: /var/log/oauth-server type: "" name: audit-dir - name: v4-0-config-system-session secret: defaultMode: 420 secretName: v4-0-config-system-session - configMap: defaultMode: 420 name: v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig - name: v4-0-config-system-serving-cert secret: defaultMode: 420 secretName: v4-0-config-system-serving-cert - configMap: defaultMode: 420 name: v4-0-config-system-service-ca name: v4-0-config-system-service-ca - name: v4-0-config-system-router-certs secret: defaultMode: 420 secretName: v4-0-config-system-router-certs - name: v4-0-config-system-ocp-branding-template secret: defaultMode: 420 secretName: v4-0-config-system-ocp-branding-template - name: v4-0-config-user-template-login secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-login - name: v4-0-config-user-template-provider-selection secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-provider-selection - name: v4-0-config-user-template-error secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-error - configMap: defaultMode: 420 name: v4-0-config-system-trusted-ca-bundle optional: true name: v4-0-config-system-trusted-ca-bundle status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "1" operator.openshift.io/rvs-hash: W6nFc_8gtQO4fL9k64HegRhAFK2eoMqKZI2s2MS8H1c55rDtm610B8sQK14pBN41yEfTg-Cq2wSwwv9YKIxURQ operator.openshift.io/spec-hash: 7016531becf81444ec94d300edc261eb54e9213947ea0edc1ab483461053607d creationTimestamp: "2026-02-19T03:25:16Z" generation: 2 labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: 6f58cc6f64 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/rvs-hash: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"cee91e96-a0fb-497c-a8cf-ab0aea39814b"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:operator.openshift.io/bootstrap-user-exists: {} f:operator.openshift.io/rvs-hash: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:namespace: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"oauth-openshift"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":6443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-session"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/log/oauth-server"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/audit"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"audit-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"audit-policies"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-cliconfig"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-ocp-branding-template"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-router-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-session"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"v4-0-config-user-template-error"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-login"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-provider-selection"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-19T03:26:00Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-19T03:26:00Z" name: oauth-openshift-6f58cc6f64 namespace: openshift-authentication ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: oauth-openshift uid: cee91e96-a0fb-497c-a8cf-ab0aea39814b resourceVersion: "15029" uid: 854a2807-7e48-443a-ade2-55ef9fb6207e spec: replicas: 0 selector: matchLabels: app: oauth-openshift pod-template-hash: 6f58cc6f64 template: metadata: annotations: openshift.io/required-scc: privileged operator.openshift.io/bootstrap-user-exists: "true" operator.openshift.io/rvs-hash: W6nFc_8gtQO4fL9k64HegRhAFK2eoMqKZI2s2MS8H1c55rDtm610B8sQK14pBN41yEfTg-Cq2wSwwv9YKIxURQ target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: 6f58cc6f64 name: oauth-openshift namespace: openshift-authentication spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: oauth-openshift oauth-openshift-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - | if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then echo "Copying system trust bundle" cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem fi exec oauth-server osinserver \ --config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \ --v=2 \ --audit-log-format=json \ --audit-log-maxbackup=10 \ --audit-log-maxsize=100 \ --audit-log-path=/var/log/oauth-server/audit.log \ --audit-policy-file=/var/run/configmaps/audit/audit.yaml command: - /bin/bash - -ec image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3167ddf67ad2f83e1a3f49ac6c7ee826469ce9ec16db6390f6a94dac24f6a346 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: oauth-openshift ports: - containerPort: 6443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 50Mi securityContext: privileged: true readOnlyRootFilesystem: false runAsUser: 0 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/audit name: audit-policies - mountPath: /var/log/oauth-server name: audit-dir - mountPath: /var/config/system/secrets/v4-0-config-system-session name: v4-0-config-system-session readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-serving-cert name: v4-0-config-system-serving-cert readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-service-ca name: v4-0-config-system-service-ca readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-router-certs name: v4-0-config-system-router-certs readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-ocp-branding-template name: v4-0-config-system-ocp-branding-template readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-login name: v4-0-config-user-template-login readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-provider-selection name: v4-0-config-user-template-provider-selection readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-error name: v4-0-config-user-template-error readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle name: v4-0-config-system-trusted-ca-bundle readOnly: true dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: oauth-openshift serviceAccountName: oauth-openshift terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: audit name: audit-policies - hostPath: path: /var/log/oauth-server type: "" name: audit-dir - name: v4-0-config-system-session secret: defaultMode: 420 secretName: v4-0-config-system-session - configMap: defaultMode: 420 name: v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig - name: v4-0-config-system-serving-cert secret: defaultMode: 420 secretName: v4-0-config-system-serving-cert - configMap: defaultMode: 420 name: v4-0-config-system-service-ca name: v4-0-config-system-service-ca - name: v4-0-config-system-router-certs secret: defaultMode: 420 secretName: v4-0-config-system-router-certs - name: v4-0-config-system-ocp-branding-template secret: defaultMode: 420 secretName: v4-0-config-system-ocp-branding-template - name: v4-0-config-user-template-login secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-login - name: v4-0-config-user-template-provider-selection secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-provider-selection - name: v4-0-config-user-template-error secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-error - configMap: defaultMode: 420 name: v4-0-config-system-trusted-ca-bundle optional: true name: v4-0-config-system-trusted-ca-bundle status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "2" operator.openshift.io/rvs-hash: KSul99onLRc4M85VWG9Bdx44MZ-AX5K5-DuJnORqEoKETeVGLdO5EF4DrGj1pHJyEu61FAPilFEH6ekG5f-sJA operator.openshift.io/spec-hash: 362bf4da4d7ebcfd75bc61d845a7a00f554e1ea340d55dce255d2961b7dbeb10 creationTimestamp: "2026-02-19T03:26:00Z" generation: 3 labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: b6d475b79 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/rvs-hash: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"cee91e96-a0fb-497c-a8cf-ab0aea39814b"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:operator.openshift.io/bootstrap-user-exists: {} f:operator.openshift.io/rvs-hash: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:namespace: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"oauth-openshift"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":6443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-session"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/log/oauth-server"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/audit"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"audit-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"audit-policies"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-cliconfig"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-ocp-branding-template"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-router-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-session"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"v4-0-config-user-template-error"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-login"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-provider-selection"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-19T03:26:17Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-19T03:26:17Z" name: oauth-openshift-b6d475b79 namespace: openshift-authentication ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: oauth-openshift uid: cee91e96-a0fb-497c-a8cf-ab0aea39814b resourceVersion: "17099" uid: 37535fa5-d1a0-4558-adb4-8a37fc4be6c0 spec: replicas: 0 selector: matchLabels: app: oauth-openshift pod-template-hash: b6d475b79 template: metadata: annotations: openshift.io/required-scc: privileged operator.openshift.io/bootstrap-user-exists: "true" operator.openshift.io/rvs-hash: KSul99onLRc4M85VWG9Bdx44MZ-AX5K5-DuJnORqEoKETeVGLdO5EF4DrGj1pHJyEu61FAPilFEH6ekG5f-sJA target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: b6d475b79 name: oauth-openshift namespace: openshift-authentication spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: oauth-openshift oauth-openshift-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - | if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then echo "Copying system trust bundle" cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem fi exec oauth-server osinserver \ --config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \ --v=2 \ --audit-log-format=json \ --audit-log-maxbackup=10 \ --audit-log-maxsize=100 \ --audit-log-path=/var/log/oauth-server/audit.log \ --audit-policy-file=/var/run/configmaps/audit/audit.yaml command: - /bin/bash - -ec image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3167ddf67ad2f83e1a3f49ac6c7ee826469ce9ec16db6390f6a94dac24f6a346 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: oauth-openshift ports: - containerPort: 6443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 50Mi securityContext: privileged: true readOnlyRootFilesystem: false runAsUser: 0 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/audit name: audit-policies - mountPath: /var/log/oauth-server name: audit-dir - mountPath: /var/config/system/secrets/v4-0-config-system-session name: v4-0-config-system-session readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-serving-cert name: v4-0-config-system-serving-cert readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-service-ca name: v4-0-config-system-service-ca readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-router-certs name: v4-0-config-system-router-certs readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-ocp-branding-template name: v4-0-config-system-ocp-branding-template readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-login name: v4-0-config-user-template-login readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-provider-selection name: v4-0-config-user-template-provider-selection readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-error name: v4-0-config-user-template-error readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle name: v4-0-config-system-trusted-ca-bundle readOnly: true dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: oauth-openshift serviceAccountName: oauth-openshift terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: audit name: audit-policies - hostPath: path: /var/log/oauth-server type: "" name: audit-dir - name: v4-0-config-system-session secret: defaultMode: 420 secretName: v4-0-config-system-session - configMap: defaultMode: 420 name: v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig - name: v4-0-config-system-serving-cert secret: defaultMode: 420 secretName: v4-0-config-system-serving-cert - configMap: defaultMode: 420 name: v4-0-config-system-service-ca name: v4-0-config-system-service-ca - name: v4-0-config-system-router-certs secret: defaultMode: 420 secretName: v4-0-config-system-router-certs - name: v4-0-config-system-ocp-branding-template secret: defaultMode: 420 secretName: v4-0-config-system-ocp-branding-template - name: v4-0-config-user-template-login secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-login - name: v4-0-config-user-template-provider-selection secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-provider-selection - name: v4-0-config-user-template-error secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-error - configMap: defaultMode: 420 name: v4-0-config-system-trusted-ca-bundle optional: true name: v4-0-config-system-trusted-ca-bundle status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "4" operator.openshift.io/rvs-hash: tK39Vlr8fpGxQ3yJ-4B-Vory9oEFJLxNsZs0mOJFHZfmwghDUxZMQOLZdGsGfidhQBbyYk8ggb7n0GMU15zUyA operator.openshift.io/spec-hash: 2f1f5410746034f8fd0b9f8d2ac6c30c281e822ae5ba664af04d48d18736a7fd creationTimestamp: "2026-02-19T03:26:30Z" generation: 2 labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: cc89c88f8 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/rvs-hash: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"cee91e96-a0fb-497c-a8cf-ab0aea39814b"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:operator.openshift.io/bootstrap-user-exists: {} f:operator.openshift.io/rvs-hash: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:oauth-openshift-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:namespace: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"oauth-openshift"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":6443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/system/secrets/v4-0-config-system-session"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/log/oauth-server"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/audit"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"audit-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"audit-policies"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-cliconfig"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-ocp-branding-template"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-router-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"v4-0-config-system-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-session"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"v4-0-config-system-trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"v4-0-config-user-template-error"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-login"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"v4-0-config-user-template-provider-selection"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-19T03:26:30Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-19T03:26:58Z" name: oauth-openshift-cc89c88f8 namespace: openshift-authentication ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: oauth-openshift uid: cee91e96-a0fb-497c-a8cf-ab0aea39814b resourceVersion: "17796" uid: b8b02fad-36f3-4eae-b43a-fae8c9d7609b spec: replicas: 1 selector: matchLabels: app: oauth-openshift pod-template-hash: cc89c88f8 template: metadata: annotations: openshift.io/required-scc: privileged operator.openshift.io/bootstrap-user-exists: "true" operator.openshift.io/rvs-hash: tK39Vlr8fpGxQ3yJ-4B-Vory9oEFJLxNsZs0mOJFHZfmwghDUxZMQOLZdGsGfidhQBbyYk8ggb7n0GMU15zUyA target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: oauth-openshift oauth-openshift-anti-affinity: "true" pod-template-hash: cc89c88f8 name: oauth-openshift namespace: openshift-authentication spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: oauth-openshift oauth-openshift-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - | if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then echo "Copying system trust bundle" cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem fi exec oauth-server osinserver \ --config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \ --v=2 \ --audit-log-format=json \ --audit-log-maxbackup=10 \ --audit-log-maxsize=100 \ --audit-log-path=/var/log/oauth-server/audit.log \ --audit-policy-file=/var/run/configmaps/audit/audit.yaml command: - /bin/bash - -ec image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3167ddf67ad2f83e1a3f49ac6c7ee826469ce9ec16db6390f6a94dac24f6a346 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: oauth-openshift ports: - containerPort: 6443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /healthz port: 6443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 50Mi securityContext: privileged: true readOnlyRootFilesystem: false runAsUser: 0 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/audit name: audit-policies - mountPath: /var/log/oauth-server name: audit-dir - mountPath: /var/config/system/secrets/v4-0-config-system-session name: v4-0-config-system-session readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-serving-cert name: v4-0-config-system-serving-cert readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-service-ca name: v4-0-config-system-service-ca readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-router-certs name: v4-0-config-system-router-certs readOnly: true - mountPath: /var/config/system/secrets/v4-0-config-system-ocp-branding-template name: v4-0-config-system-ocp-branding-template readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-login name: v4-0-config-user-template-login readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-provider-selection name: v4-0-config-user-template-provider-selection readOnly: true - mountPath: /var/config/user/template/secret/v4-0-config-user-template-error name: v4-0-config-user-template-error readOnly: true - mountPath: /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle name: v4-0-config-system-trusted-ca-bundle readOnly: true dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: oauth-openshift serviceAccountName: oauth-openshift terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: audit name: audit-policies - hostPath: path: /var/log/oauth-server type: "" name: audit-dir - name: v4-0-config-system-session secret: defaultMode: 420 secretName: v4-0-config-system-session - configMap: defaultMode: 420 name: v4-0-config-system-cliconfig name: v4-0-config-system-cliconfig - name: v4-0-config-system-serving-cert secret: defaultMode: 420 secretName: v4-0-config-system-serving-cert - configMap: defaultMode: 420 name: v4-0-config-system-service-ca name: v4-0-config-system-service-ca - name: v4-0-config-system-router-certs secret: defaultMode: 420 secretName: v4-0-config-system-router-certs - name: v4-0-config-system-ocp-branding-template secret: defaultMode: 420 secretName: v4-0-config-system-ocp-branding-template - name: v4-0-config-user-template-login secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-login - name: v4-0-config-user-template-provider-selection secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-provider-selection - name: v4-0-config-user-template-error secret: defaultMode: 420 optional: true secretName: v4-0-config-user-template-error - configMap: defaultMode: 420 name: v4-0-config-system-trusted-ca-bundle optional: true name: v4-0-config-system-trusted-ca-bundle status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 2 readyReplicas: 1 replicas: 1 kind: ReplicaSetList metadata: resourceVersion: "50090"