--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-02-23T13:15:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"21f6cddf-8fad-4688-80db-2aa516d64e53"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-23T13:15:09Z" name: oauth-openshift-dockercfg-nlmwg namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 21f6cddf-8fad-4688-80db-2aa516d64e53 resourceVersion: "12795" uid: e7ba4b95-e33c-42f2-820f-a02ef9bf8c48 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-23T13:01:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-23T13:01:36Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6078" uid: 02a5ea8e-5063-431e-8c34-4cad81f17e06 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-02-23T13:01:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-23T13:01:47Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6817" uid: 5c16ea03-7539-4634-b4a6-b5004cd13804 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJQ0J3cnE5cXZFOHN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM01UZzFNVFkzTnpBZQpGdzB5TmpBeU1qTXhNekF4TkROYUZ3MHlPREF5TWpNeE16QXhORFJhTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF0QWFvRVpucUpMNWxFMU9VMzVNNEtHcEp5TUxvTWJHRQpYWHozZUo5OUl5Q0JJOVd4V2lERzBVaWdnZ2VHd0gxVWc2azdyR2lnSnpnSEwyNFZPZmk1K2xkOUZidkRDMFRlCm8xUmlWN2l1ZUUybENZd3B4eE1UL2hkdmFCVGtuaGlXOGgzOUZMaE1qcGhmZ0NralFoQktLUWNnOHg3ZUhpMGIKS2V3dzBVSjFMeHdSWUtOVnVwNG9XNHNrTGZKRFJxM2hkSW9rcW1kNVdMOHNKSkowYTMvcWIzS0kxdVlOczFCWQpiVWVlbkhFTThNVU01Y3FidmVsKzkybGJZcVlVd3dsTG13UzRNMEt1ckNwTWVSUkVZREU4dStmblMxUFJxNWdqCjJ2OXdNcXhrMmgySFlyZG5RaWdsZjdLMkRnRm9OVm1YM0UwZzlaRm5LNUVXSVcyaTJHcmhUUUlEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGTUppS2ovSmhzL2J5S2F5R2VrUFYvWDg1MWd3TUI4R0ExVWRJd1FZCk1CYUFGQndHdk9DdGE5cjFITGxXYS94S0tnT2Y3SEwvTUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkdRellUYzFaRFZqTFdJeE1URXROR016T1MwNU9URmpMVGt3WkdFek5HWTAKWVRNM01UQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUF1b0w0eWFHc1lDQ0QzL2FwY3pEOW1Ta0wrd1pVR2ptZAo0dXMxanJKblhERzFvcWFLWjFRbnYyMkw1bFQ0Vlk4VWl1THpzM25iczkvakdWUS9BejhWd1VDR1lvSWF2TXJzCm5XSmhzM3FnbUdaZEZ2YSt0SGhKS2ppb3VYWVJlbkg0MWgzSEw2SXdRcVVDNEZodTRKTXF4QjlKZ0VKd0Zvb08KZjNFb1pjRlB3S0prZDlqOUFkYXBPVitTWTZlU2R6WjE2ZTJiM3pCeFhBK1E4RGZWMUFlTGx5c0xNK1pEL21RNAo3N25HQmJEN0tzczU4cWVmSGdzMHhlenhHTlZ5d1JIU2xxemIxRGJ6SC9POFE2QndOSDJBWEpidFFJM0RURjJsCjRlVXNTT0dQanZCbUFuTW9sQXhIMUU2QjRPbS9JNldjY0tqZXgvc0lVZ0lPWE90cG9WbzNUUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJV2xUclYxemRERlF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM01UZzFNVFkzTnpBZQpGdzB5TmpBeU1qTXhNekF4TVRaYUZ3MHlPREEwTWpNeE16QXhNVGRhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOekU0TlRFMk56Y3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRREhZUXB0UU15RmtoZnJVdGEyYy9Jeng0cStBNXd3VkF1ZgpvVlUrb0NiY1BHak9GM3RJQlRMU2FJbzgzQzUrK0VQcnZVbE5SRTdkTDFhYkhGeVBxcHVKWC9NUVdZVGtnazRRCkE2eklyVXR3ZXpkaVo3NUFqL1J3NUI3SWdXRGhaanF2ZllUNFg2clZia2NlLzVmNTk5Um5GQjFDOVp0UlZIMU4KNEc0bUMyUzNXYXRYcW5xN0QxNDVNK3RqV255MndhMnI4OC81d3hEbFJuZytsR1VIdi9VaEZqT0ZydEhiQW5ZawpqTitXUmFYL05aQkRRRjRFL3FYRlp3cE94ZURaSGRlV0p2V3lQd1FCVjRaa2RUalBmd0J1d0pzTVBEbW1QSnZTCjZ2NzdWcFJVOVBiWXJoTVdjUnRpZm16QmgzNkFCY201TkppNW15RmR1cmNjNDVZelVjMXpBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlFjQnJ6ZwpyV3ZhOVJ5NVZtdjhTaW9Ebit4eS96QWZCZ05WSFNNRUdEQVdnQlFjQnJ6Z3JXdmE5Unk1Vm12OFNpb0RuK3h5Ci96QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUF1WElESUhUSU9yNi96MFJKcnJhbE9SNjFqQjdNRndOMGRaazIKNGFPaE1WTW5oL3pyeVVDV0FZd1VOYjRmdk5Gdkl5dnFQRlI1dG82N2RnQ0FxNElGWGxBaVJ3ZSsrWjhnMXpGKwowbitFQllPYkN1aHowZzM4YnEwWGp6UWMza1R0OVczTitMMi9wNHV4dDQ5WjV4Vm41c3RwU0RXWlBXTDhrWVN2CjRPYmY1UWxKTitNbkptZzkrNG5QcjE4bTRjUXE2OW9BQ3ZyVFdJc21SaGxwdzZoRTFXak9OUFZkak9Ya2c3aDcKYlltdUlKYzNieEQ1NGZrQ2hPRDdYWXVGZ0IzZDExa245RUFKQm5UT1oxOXphc1lodTVWZU1KWitXaU5IcDA1OApueHlBcWpUcXdZdGw3QlNUZGkyamNFcXd5bTgvazVwc1BZcjVYeFBRTjFWZXRDbFJyUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-23T13:01:44Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: d3a75d5c-b111-4c39-991c-90da34f4a371 service.beta.openshift.io/expiry: "2028-02-23T13:01:44Z" creationTimestamp: "2026-02-23T13:01:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d3a75d5c-b111-4c39-991c-90da34f4a371"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-23T13:01:44Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: d3a75d5c-b111-4c39-991c-90da34f4a371 resourceVersion: "6616" uid: 17e0f039-b03d-4091-8b49-cd2080b4406b type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-23T13:15:18Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-23T13:15:18Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "13670" uid: 00b8ff56-d46e-4297-b750-cfa60355d5a1 type: Opaque kind: SecretList metadata: resourceVersion: "38359"