--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-08T21:58:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8868f94b-8edc-4296-8078-0148455830a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-08T21:58:23Z" name: oauth-openshift-dockercfg-bk27b namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 8868f94b-8edc-4296-8078-0148455830a7 resourceVersion: "8457" uid: 239d8ae4-4b34-4c09-beda-279a49cd4954 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-08T21:57:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-08T21:57:49Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5679" uid: 91747390-8c19-4603-bf37-6f88af377176 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-08T21:58:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-08T21:58:05Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6879" uid: e23284ea-e4ab-4aa4-a8e7-f9f17705e927 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-07T21:57:57Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 8f24a152-31e4-4f59-994c-f8e0cb81f6ea service.beta.openshift.io/expiry: "2028-03-07T21:57:57Z" creationTimestamp: "2026-03-08T21:57:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8f24a152-31e4-4f59-994c-f8e0cb81f6ea"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-08T21:57:57Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 8f24a152-31e4-4f59-994c-f8e0cb81f6ea resourceVersion: "6384" uid: e6ea5d79-7bb4-474e-9722-b38d5cb0a087 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-08T22:13:56Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-08T22:13:56Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "12942" uid: ff0952a9-5c14-46dd-8378-64d1b06c1149 type: Opaque kind: SecretList metadata: resourceVersion: "24001"