--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-13T01:14:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"be3846d4-141c-459d-a4cc-87ff291a151a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-13T01:14:13Z" name: oauth-openshift-dockercfg-lkt5b namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: be3846d4-141c-459d-a4cc-87ff291a151a resourceVersion: "7715" uid: f254a23f-95b9-40d6-b730-fd636caca0f7 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-13T01:13:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-13T01:13:52Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6218" uid: bb07dbf1-48f9-4399-97b3-a93391655372 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-13T01:14:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-13T01:14:07Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "7158" uid: 14a0741f-d598-4360-96a3-531066d3fb49 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-12T01:14:00Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 80385364-aec5-4fb7-9df0-38e7bc47c5cf service.beta.openshift.io/expiry: "2028-03-12T01:14:00Z" creationTimestamp: "2026-03-13T01:14:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"80385364-aec5-4fb7-9df0-38e7bc47c5cf"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-13T01:14:00Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 80385364-aec5-4fb7-9df0-38e7bc47c5cf resourceVersion: "6585" uid: 662191c4-bcc3-4d04-b04c-349bfec480d3 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-13T01:23:55Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-13T01:29:16Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "16211" uid: 7a72d7f1-2abd-4cd2-9b69-e8fd320254b5 type: Opaque kind: SecretList metadata: resourceVersion: "38868"