--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2025-12-05T12:38:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f837347c-d03a-4af9-b1fe-ee403c1674f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-12-05T12:38:03Z" name: oauth-openshift-dockercfg-xzgbv namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: f837347c-d03a-4af9-b1fe-ee403c1674f2 resourceVersion: "7857" uid: 654905ca-d66e-4a3f-b329-02a731f17955 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-12-05T12:32:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-05T12:32:27Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6107" uid: 818100d2-dfe7-4e46-9305-f38c06b7ac3c type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2025-12-05T12:43:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-05T12:43:03Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "11278" uid: 1428a5f9-6300-4166-8278-5322a5518b6e type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2027-12-05T12:32:40Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 612c819f-eda9-4261-8b4b-c62c1e364eb1 service.beta.openshift.io/expiry: "2027-12-05T12:32:40Z" creationTimestamp: "2025-12-05T12:32:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"612c819f-eda9-4261-8b4b-c62c1e364eb1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2025-12-05T12:32:40Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 612c819f-eda9-4261-8b4b-c62c1e364eb1 resourceVersion: "6574" uid: a1f8516c-5581-492c-b27f-ccc4fb050073 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-12-05T12:50:11Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-05T12:50:11Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "13082" uid: 9823fd50-060e-4945-8654-766c63cc38b8 type: Opaque kind: SecretList metadata: resourceVersion: "51002"