--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-02-16T21:23:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3453f5fa-e634-4c46-857a-d82d34c77fde"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-16T21:23:38Z" name: oauth-openshift-dockercfg-2t2pz namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 3453f5fa-e634-4c46-857a-d82d34c77fde resourceVersion: "15868" uid: 0a90b67b-ed72-4174-b633-c1ef35c93bbe type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-16T20:57:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-16T20:57:28Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5778" uid: df1abbb5-8199-4957-9d44-655e77e9aa4c type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-02-16T20:57:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-16T20:57:39Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6531" uid: 1e76d261-bd91-4db5-bbba-a353933d04c7 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJTWhKb25JWThlNWd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM01USTNOVFF6TWpBZQpGdzB5TmpBeU1UWXlNRFUzTXpWYUZ3MHlPREF5TVRZeU1EVTNNelphTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUE0bUhHOTlCUlc5a3JpM0JVdmJlRGZrRjJGejFnS2VqcgpsL3YxUnRlYzF1Q2EzQjU2Y3pRNkxCM01mbVI5TGx6cVFsRWRSOFZGOFpTbVg5R3NsdEZiMXJUTVB6VkVzNmszCk01ZXQ4dUpxaFFNMTZ5SFBVUXpjeGNzdDZHbnVybVpwc3YwT0Iwc2p5b282bUJ6aUZjU2JQVVQ0ZWpBc1EraFMKcm5LS2hhRk84YUpHNkNPbklyY2hqQVdSU1VuZkd4dG1YdHRtSU13a0lCSmhHT0E2alQxZVFYQlZ6YVpUU1VzbgpuY0ZuR0ZTQ1k1LzJwZTNtT05jZCs3cVU0ekdiT0wxaDNCcUttRGoyMXFjcVJkQkYxM21ZVGsvKzU2c29wRFhSCjhDSjJWMFl5YW92aTFWK0RkSTRZTUZwWVFxbXRjTE1XdmVnclA1M29jaGJZZTVxaXBnM1hkd0lEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGT3hONjdiMXlQaEkreENVMGd0TWpweDZ5blFUTUI4R0ExVWRJd1FZCk1CYUFGUDBzbEZHaHNJb3dEdUlLYTRNR21ZRGptSDU2TUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkdJellqSmlNRFpsTFRRM1pXRXRORFJrTWkxaFpqZGlMVFU0WmpVMU1tVTUKWkdRNU16QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFQL1N1MHd5QmJTVlk4ZVdUS09lTzFDeUF6MTZqdnhiZwphcVhUa0FHYXpmMVQ2S3ZXV3JNUC85RXJrVWUweWJ2bmVKV1Irbks1a0grYjZIQ1JrYzRjZ1VvL1dzT0NZT0g5CmxQZ1Fvd0ZMZ3lFVFpsRWpCTXp0N3gydWNLQi9ramNMZ1BHRkhnYldZeU1kK3Mwd2VNOEphWFpic2tOenlMZW0KMFNKRVV2dGxnMWJ0bTdJb2RucFhwVDg0am1HVlZzVG4xRTRwQzZoM0g5SzA5MGx2emtWS04yWC9sM1NZeS9qRgp0ZE5LSytDYUNmWGRoK2Nqa0hkYW5YdTdXeVU0cU56Sk02QjIyVFplOGJINFFFa3dyQi9YVVh1NHJLMk1VQUxFCk5qZjJLWFliWmtHVStvRnN2b1pxY0pFTUlMdDFFMEsvT0NqY1dmN1N6MHh5MTVnajJ1cVQ5dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJQ3VYWXdkRWpaS0F3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM01USTNOVFF6TWpBZQpGdzB5TmpBeU1UWXlNRFUzTVRKYUZ3MHlPREEwTVRZeU1EVTNNVE5hTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOekV5TnpVME16SXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzVKaUU4dmJIU2NsRzZnaEhZNWRwVXpEYVkydlRjNnB1TApyTTRFSk0xKzVqcmhBeGhZcGxFVENXVFN3Rlc5S0tTaU96ZGFpK1B5NnVNdEozTnZodW1Oa2tqU2FqRXM1Sm9mClZIRmkwNEVNNk5JSnNSeTByNzFVSXhBRXFaQXRLQVlTVDZ3Y1piNzV0blRmK0RFdDlzSnJUZS9KRHRubHVZcmEKd3lBY2lzMmcwSnIrajJuY1BjNC9KVzV1TUdpdGpOakxzdmt0cEoyak92ZitPclVvc1JvRURaR2pnRVUxclJRTgp0bkNvZHRUVGpSSkJvbE5FMHNDakY4SnIvWThGR0JRZFpCdmlFREFVNjU0TWpPNnJNZjkvS0pVbXVXUExTd2pnCkd3QTlNUFlpNHFXdHFWVFdkdnJHaWpVeStwUllXV0JUeGVsZmNwM0E4ZlgxUkJQQzljWnhBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlQ5TEpSUgpvYkNLTUE3aUNtdURCcG1BNDVoK2VqQWZCZ05WSFNNRUdEQVdnQlQ5TEpSUm9iQ0tNQTdpQ211REJwbUE0NWgrCmVqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFGNnZ4eEVsckcxVzZESi9IemZLSGtjdlFkLzVoQmZzUHBLS0sKSzVtOVl3NjRNd3ltMzd1SXVMMXM4N0JxaG9RUjcvTjFXVWNyaHRkNzdGMms1M2k4VXhRb3RXaVNKMyt3b0pWSQo2bUNHUklLL3RFZ2NBZHJ4c3JSU1ozaXdwdHJDZkJCbnE1cE1iSUwrKzE0NHNwZWVKVXEzNk9QQ05Gc05rNXcyCjFOMVJjN3R6R3FDazB1d0pSQnE3Zm5BVW9WUFQ1WldxWnllM0NSR1hUVmFzbEptamRhUEllMlNuQVZ5QUZEY0QKWmpzcTZZSSt5Yy8wT2dsR1pOclpuYzY3OGpKbmloNTBubHJEeTJ6TEt3SnpxcHFIYWR0RTRDSWRHNHVmaG4vTAphZjgwdXZlaXY3cG12YXhNQVhRdGIzZmQ0WmRBakxsdHpNaGVSMVlreEVqcjZQMTFpUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-16T20:57:36Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: b3b2b06e-47ea-44d2-af7b-58f552e9dd93 service.beta.openshift.io/expiry: "2028-02-16T20:57:36Z" creationTimestamp: "2026-02-16T20:57:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b3b2b06e-47ea-44d2-af7b-58f552e9dd93"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-16T20:57:36Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: b3b2b06e-47ea-44d2-af7b-58f552e9dd93 resourceVersion: "6314" uid: c686bcba-a25c-4e66-bf71-70e59e388155 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-16T21:23:41Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-16T21:23:41Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "16110" uid: 51d7b2ed-0070-42b1-b62c-c1b128547c1c type: Opaque kind: SecretList metadata: resourceVersion: "55981"