--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-09T16:46:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"197d61b5-e3d0-46c3-8ee8-79f88a705b5d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-09T16:46:35Z" name: oauth-openshift-dockercfg-dzbl7 namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 197d61b5-e3d0-46c3-8ee8-79f88a705b5d resourceVersion: "15021" uid: 4e3cfd91-a0e7-451e-9752-2c1719e5a1d6 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-09T16:26:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-09T16:26:03Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5440" uid: 1ca6c8bb-21cf-4e93-9cd1-dd5df3adffdc type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-09T16:34:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-09T16:34:06Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "12288" uid: a5d9c3aa-498e-4598-aa22-abd95b8ca47c type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJYnVhbHNvTlVFZHd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016QTNNelUyT1RBZQpGdzB5TmpBek1Ea3hOakkyTVRGYUZ3MHlPREF6TURneE5qSTJNVEphTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUEyYlF5bnhLQWZpRFpSSFM5VmtWdEF5bWhOMXo3UE0zcwpSaTUzQkZab2txSWREeWNQQTdmOUk0d213OHF6SXZRWW92MzJLQjRrdG52eEZXemFDc0N2bnRWeDhhYXZXaUVjClVaY0NYTW1DV1V3NTV3aTVHa1ZFRjFJcDRvQjBGTkxMNFdPU05UcTRGWkplb1lzZUlSeitpZFNvYUk3UkRhdVYKR2pzRTg4SVQ2VGVCSGVjaU1SdnphYW5LN2h6ZTRjK1VqNEdPSFd6MmxNSDZnUXF2QlNHd3VkMmUyRUVRNythRQpac1BPblVLcHVYRXhta2N3TWhLMy9temVRdWkrSlRDNDdRV1p6SzlvVGNaK2xPNVN1QTZ6RSsxaUJabFB2Q3BHCmtUcWcvVFhDYmFXMkNTNzhPeDllR29WM3JUb2w4WUJBOFNIMTJHdmJEbmp1SnJRdUdDQk5Xd0lEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGSzBmYnlkcmRqRWxYdFRDZi9YSHNvMkhvMWJuTUI4R0ExVWRJd1FZCk1CYUFGTXBHRzVzMGFMQTZmRElFMzNzZHF2empFanhRTUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkRka09HVmlNREJsTFdVNFlqTXRORGN3WkMwNVpHRTBMVGcyTkRWbE16QTMKWm1VNU5EQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFSQ2lWOVduK1BGRjRrTlRjZVNCRUswaE45UlhHRlFyTQp0cUxuWkJ5ZW91RXNERzZ1V21ISmFubzY0YnNqbHg4OWVMSEhGaXhibGZuVmgwa01XcktoLzMyQ29sM1JYMCtJCjZwd0xPMlgxZzdzWWh0OWNBSHpnYkV0WmRDSU8yZzZNYW0xMTZpamtlZkVzZFdKNjVSNjAvNXZqSTd4VFkrbW4KTHpNYnlaeEJ0d0JMelF4WTNNc2tFZ2JmV1ZqcC9CYitscGhGZnhxdVMyK3RDL2dlTm1pV01DdzR5UFh6QjAyeQpQdnVGdzFNcGVDTmNJRXJsN0syYXBBbzdSTC9DS0huNkZmVStMQURXTmxWS2x3YnJYamhiZE4vUzJXMDhnM29WCnJlajVEWko1Z2VsMElYdHRHWVlEN0l5VU1EVHI0eE1jU0JYRU9MUkVjVVpyWWhpM21KT2VWdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJVTQ4a3BTcURTU0V3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016QTNNelUyT1RBZQpGdzB5TmpBek1Ea3hOakkyTURoYUZ3MHlPREExTURjeE5qSTJNRGxhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOek13TnpNMU5qa3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRGRIRjZJaEhsUGxUS3FEL2JJQzBnVEdydExjWXVmb2RZbQp3d3VIMzNobnZCVC9DTXV0bnlSUEx2SFQwU2FFdk43TjhNSUgzN2dPOHRoSlhLWWYraXFOcVJKR1dXd3dUUlVzCjBOU210UHpYUjljb2p3dFM5a1dVbW44ZnR1ZEtiNmV2R2JXOW9vb1Qza3RlQ1dSOElzWXRVeTdvNjNBSjhPdFgKTVBGMzlSL2w3c01kS3RCNlplYlZyeGZ5cHJGWjFldXlMVzhobzVlLzlRdU9kVjdCU1ZtQnhheHZqeG55dGE1ZgpPM3dWYjloYmZwUStXSlM2dmtKNWJkQlhzQ0xGY01Iazl6NmltYm9ZdnhzS0ptZ0VQakJyN0NjWTlBem1VdmExCkViWVFsUHljejg0a01lY0RvRWFweFE5YVI5ZmVVY0haUGdEYjhRMXpjZE4vSXh6TlFsYkJBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlRLUmh1YgpOR2l3T253eUJOOTdIYXI4NHhJOFVEQWZCZ05WSFNNRUdEQVdnQlRLUmh1Yk5HaXdPbnd5Qk45N0hhcjg0eEk4ClVEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFRVmQwM0Q5dWJlWEJVMW8xZWd4Ykp6ZXQ3a0hjeGNVNGp3U3MKc3VXZWlsUGFZcGVibWFiazFuTlY2TWFsd3dsWExSWkRjb0hTT3dkZ3I4cGVoeDZHQWt2RlRxZmhGd0VCcHdPcwpZTFBVajdrRXhtZHVBbkUwV3BrdjFTNkdxU0VTS0RVZjlpNGhURWZmZ3JLU2NJTmh1WEZUVXdET0FYTWVDWkc0CjVRQnNNNjBQLy9CWERDUnVHTGcwMTlrS1JhMXV5emZlNmF0bVFWVE0zeWJ4eEFySlpvQlROZ2JqWG5kM1JGWHMKUklaOFp3ZndlU0hhcll1YlUxS0dhMGlLMGRSa2FiZGhaT2tmVjM0YVdFeGRNSGZlYWR3a1J1QUNiQ3BneG5VZwpKMTY4SHQ3QXFaN2QzZnN1SGMyRlBYbnZyTE16WFFwSGtDM1hhTjltWmN3Sm9lL1p5UT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-08T16:26:12Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 7d8eb00e-e8b3-470d-9da4-8645e307fe94 service.beta.openshift.io/expiry: "2028-03-08T16:26:12Z" creationTimestamp: "2026-03-09T16:26:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7d8eb00e-e8b3-470d-9da4-8645e307fe94"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-09T16:26:12Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 7d8eb00e-e8b3-470d-9da4-8645e307fe94 resourceVersion: "5985" uid: 0e1afe69-9d7c-49c4-bd0f-7b26d16e5bbe type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-09T16:46:53Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-09T16:46:53Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "16555" uid: 5ffcda1e-6ad6-42c4-95cb-74a809f669f9 type: Opaque kind: SecretList metadata: resourceVersion: "26262"