--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-20T08:50:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f2a4c1e9-b639-42bc-82a1-08499d20ae56"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-20T08:50:28Z" name: oauth-openshift-dockercfg-6n6jl namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: f2a4c1e9-b639-42bc-82a1-08499d20ae56 resourceVersion: "14195" uid: b89805a0-0121-49bd-953d-22f98343bd04 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-20T08:35:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-20T08:35:39Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5717" uid: a289453c-01a5-4249-ad08-c9568de53ca8 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-20T08:35:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-20T08:35:57Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6540" uid: e7753a85-07ba-49c5-83fe-b4b321b19c88 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-19T08:35:50Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 00fcf340-df81-4475-ab29-63d75f596d43 service.beta.openshift.io/expiry: "2028-03-19T08:35:50Z" creationTimestamp: "2026-03-20T08:35:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"00fcf340-df81-4475-ab29-63d75f596d43"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-20T08:35:50Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 00fcf340-df81-4475-ab29-63d75f596d43 resourceVersion: "6075" uid: 638d8310-2b26-4b02-9d5b-7a2de72ac2ec type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-20T08:50:38Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-20T08:50:38Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "14769" uid: 66657591-1ae9-457e-bafe-ed280a325975 type: Opaque kind: SecretList metadata: resourceVersion: "23675"