--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-02-20T15:01:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0dd2df8-585a-45c7-a083-1cee8a289036"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-20T15:01:41Z" name: oauth-openshift-dockercfg-2wv5x namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: c0dd2df8-585a-45c7-a083-1cee8a289036 resourceVersion: "15699" uid: 157be008-6803-4afb-9e2d-c111ee48f312 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-20T14:47:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-20T14:47:17Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6078" uid: d8fd51ce-ac33-48e6-8a4c-69583f044003 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-02-20T14:49:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-20T14:49:40Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "10083" uid: b0269e06-542f-4fe4-b572-f4a65a08b0e6 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-20T14:47:25Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 752e43cc-79f1-4db1-bff0-97c98311dc0f service.beta.openshift.io/expiry: "2028-02-20T14:47:25Z" creationTimestamp: "2026-02-20T14:47:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"752e43cc-79f1-4db1-bff0-97c98311dc0f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-20T14:47:25Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 752e43cc-79f1-4db1-bff0-97c98311dc0f resourceVersion: "6511" uid: 9767edc9-6de0-4681-86e4-e1978ae38fb9 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-20T15:04:29Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-20T15:04:29Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "16624" uid: ff435f39-d7eb-4a0c-9fa6-60706afa43e1 type: Opaque kind: SecretList metadata: resourceVersion: "40564"