--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-12T14:36:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f3722d1-ecff-4199-8c5f-cdb8b8f84287"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T14:36:02Z" name: oauth-openshift-dockercfg-fsj54 namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 9f3722d1-ecff-4199-8c5f-cdb8b8f84287 resourceVersion: "14002" uid: 9abce648-9b17-47f3-892c-a23ee85d5735 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-12T14:12:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-12T14:12:40Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5573" uid: 75f93add-5ebf-44e4-8fbe-fbd4f1674b95 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-12T14:12:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-12T14:12:57Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6742" uid: 4e7578f9-3821-4b0b-b677-0bb76974d2df type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T14:12:49Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: cc436b63-8235-4d97-b5a2-a883d4757af5 service.beta.openshift.io/expiry: "2028-03-11T14:12:49Z" creationTimestamp: "2026-03-12T14:12:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"cc436b63-8235-4d97-b5a2-a883d4757af5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T14:12:49Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: cc436b63-8235-4d97-b5a2-a883d4757af5 resourceVersion: "6338" uid: cfbd3ad1-43f7-455a-8a4d-e2c44714f10f type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-12T14:36:21Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-12T14:36:21Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "15726" uid: 4b459ea2-5d92-4146-84ed-c141eda6ac94 type: Opaque kind: SecretList metadata: resourceVersion: "40485"