--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-12T18:29:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1ca141da-83fa-483f-87f8-35f49b039a08"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T18:29:51Z" name: oauth-openshift-dockercfg-8jt4h namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 1ca141da-83fa-483f-87f8-35f49b039a08 resourceVersion: "14446" uid: db11b89f-2e89-41dc-809b-1d3d2b92b74f type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-12T18:13:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-12T18:13:58Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6674" uid: 36b14d35-b53c-48d7-9ddb-d6dbfb19c265 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-12T18:13:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-12T18:13:57Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6664" uid: a2cb9a6c-2f5b-4734-bacb-a9d183d405cd type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T18:14:08Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 7903766c-72a5-44cf-a3e5-c3212448576e service.beta.openshift.io/expiry: "2028-03-11T18:14:08Z" creationTimestamp: "2026-03-12T18:14:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7903766c-72a5-44cf-a3e5-c3212448576e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T18:14:08Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 7903766c-72a5-44cf-a3e5-c3212448576e resourceVersion: "7231" uid: 1d9b1b16-cb56-4797-b5bb-e9e50c062f07 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-12T18:34:23Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-12T18:34:23Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "17031" uid: cb308748-3da9-4f51-9811-b2a98b91fa73 type: Opaque kind: SecretList metadata: resourceVersion: "39076"