--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-02-19T03:12:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61eb068d-ae0d-4e6a-9be6-98d94c55f8bc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-19T03:12:30Z" name: oauth-openshift-dockercfg-kpjkc namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 61eb068d-ae0d-4e6a-9be6-98d94c55f8bc resourceVersion: "9268" uid: 41d43a5c-cff4-48f0-991e-0c468d8cbb2d type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-19T03:05:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-19T03:05:29Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6199" uid: 84a60127-bf46-4ebe-aea6-82c7557f3e63 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-02-19T03:05:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-19T03:05:35Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6437" uid: 5cf6f0f0-e255-49d6-8da8-6c4b11923cda type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-19T03:05:40Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 89ce22b3-adef-471d-a354-e3e301f2da77 service.beta.openshift.io/expiry: "2028-02-19T03:05:40Z" creationTimestamp: "2026-02-19T03:05:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"89ce22b3-adef-471d-a354-e3e301f2da77"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-19T03:05:40Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 89ce22b3-adef-471d-a354-e3e301f2da77 resourceVersion: "6827" uid: a8f1e795-f188-44f5-a291-71f3c37756a5 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-19T03:25:16Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-19T03:25:16Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "13735" uid: a681351a-69f9-4eaf-ac69-3a836ecfac7b type: Opaque kind: SecretList metadata: resourceVersion: "50090"