--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-02-23T14:19:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0368a6ba-68b7-464a-b20b-dac8c0e04eba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-23T14:19:30Z" name: oauth-openshift-dockercfg-f27w9 namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 0368a6ba-68b7-464a-b20b-dac8c0e04eba resourceVersion: "8552" uid: 4de486e6-4313-4022-b168-f968356f198f type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-23T14:18:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-23T14:18:51Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5177" uid: 3cce4c52-7e2f-45bf-b7d2-d263e8094615 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-02-23T14:19:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-23T14:19:17Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "7000" uid: b43f1970-fc73-4227-85ff-ca5817c7fd2b type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-23T14:19:00Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: ca57253d-d365-4100-a224-a2c12f74d4bd service.beta.openshift.io/expiry: "2028-02-23T14:19:00Z" creationTimestamp: "2026-02-23T14:19:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ca57253d-d365-4100-a224-a2c12f74d4bd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-23T14:19:00Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: ca57253d-d365-4100-a224-a2c12f74d4bd resourceVersion: "5929" uid: 827eeeaf-83dc-4bb6-963e-0e6b47f135de type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-23T14:34:40Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-23T14:34:40Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "12659" uid: 7f1198d6-add9-4e7a-a908-065a301ac9a6 type: Opaque kind: SecretList metadata: resourceVersion: "53621"