--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2025-12-04T00:31:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4ee64b83-d279-4ff0-b89d-8c83ab0ed6fa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-12-04T00:31:06Z" name: oauth-openshift-dockercfg-k98bs namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 4ee64b83-d279-4ff0-b89d-8c83ab0ed6fa resourceVersion: "8131" uid: 572af29a-db04-4e28-9460-f8ccbcfc425d type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-12-04T00:30:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-04T00:30:37Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5894" uid: 64e52c29-ffa7-4d2f-a1e9-48343ef9a57f type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2025-12-04T00:30:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-04T00:30:53Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6780" uid: b39f465a-f544-4556-86ea-f005d5d60af0 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2027-12-04T00:30:44Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: ec2d302e-120a-403b-902f-abf3931e03c8 service.beta.openshift.io/expiry: "2027-12-04T00:30:44Z" creationTimestamp: "2025-12-04T00:30:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ec2d302e-120a-403b-902f-abf3931e03c8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2025-12-04T00:30:44Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: ec2d302e-120a-403b-902f-abf3931e03c8 resourceVersion: "6260" uid: 598ac221-cc7c-40fa-9462-7ce778975af1 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-12-04T00:50:18Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-04T00:50:18Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "14393" uid: 1795177b-730f-4af8-af44-7a88f4cd65ab type: Opaque kind: SecretList metadata: resourceVersion: "46847"