--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-02-16T02:23:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a56450fc-41c1-45c6-ab22-e56c6d2f3be9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-02-16T02:23:04Z" name: oauth-openshift-dockercfg-xg7sl namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: a56450fc-41c1-45c6-ab22-e56c6d2f3be9 resourceVersion: "14205" uid: 62bda372-531c-49a8-ac76-131fe00cc577 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-16T02:06:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-16T02:06:57Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5538" uid: 36f98df9-b7ef-4b53-913a-7884d2d2beaf type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-02-16T02:07:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-16T02:07:14Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6660" uid: 498d69af-8957-4ddc-acff-6e805bde1b6e type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJUG0wdVZTWFNMcG93RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM01USXdOell3TWpBZQpGdzB5TmpBeU1UWXdNakEzTURWYUZ3MHlPREF5TVRZd01qQTNNRFphTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF3RGJrRXhzMVJUeFNaM0sxNGUzTXdNMGU3UkdkZTFDagorQ1hNMG5VUzZtT3FOSVFWM1FCUGJ6a1hXR1YyL3JmS3JwT1VkSFhuSU9ZRlZxTDVBZ3Vnekx4ejZSeEpjalE2CkR5b2hRSUd5Q2EvN25aTFJpNTdvN3NKMCtIMjQvdldQQzdGVVZxOG1UNlhpblY2aS9mbU9sZTRkYWd0VFNnbjYKZWFtVWZjcXNUTHZrZnR5Wk5mY1Zqd3hPWXpiZVA5RXFSMUhrRmRkYjJNaVAvMUtIOHhxU0pNQURpQ0RmZ203UQpuclQ0NGVLR3k1TE9XdnRwNjRGaVU3SnNSVWtYRmdXbS9veUdEbU5sOEtlVXdna2NLSitNOERBWlNHODZjSEtQCnduOHNYdkZ3TlNVVHBsQlA5TnNvZ2JnTnZablJNcDIvZnlYakxmNzRpMWgwNGNLa3RybUhJUUlEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGQUh0RVNDR2cybmk3S28xU0dya0xtVkNzU1VlTUI4R0ExVWRJd1FZCk1CYUFGTzRnbUVlQWhubGREbk1BQ3d6MmZWQVN5aHp1TUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkdWak5URmlZMkZtTFdFeE56VXROREl6WmkxaVl6TTVMVEEyT0RSa05EQXkKWkRWbVpUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFiWjNWajVUUSsycTdhTFJ6R0tqNkFJWmE2UVY0RmtTQgpZaDgvVkxsN1Z5a0RIOGtkRDc0MngvV0J1L2thbDk4ZHI4VUIzLzdPZytWckFVc2M0U3MxRE5tWklJek1Wa1pHCngxQmxENTVXcUdLVUxraEp3U21rM2hLelpzR2tLcVNRdVRzeEVpZEZubU9XVVg5YldFczJuMm02RDBxV1JQeDQKRzBBSG1aeDMzcnRVbW1uVE1DTGY2cDJUQy9CMFNmbmMrTzY1Y2ptbk5FbFE3akM1NDdpbmMwQjFMZFJpQWEwUApYNWhNcGcyZnp4MDBJNEh1T1liaEZ2VXAzd3BWTEQwVnE2R0JsRk4yL2JDM21pR2owNTZKZHh2Vm5RRHltcGRPCmVTN1BQaFRnbjFkRERXTmJMLzBTK09Gc0RycmJVc1RnWUpjQUlKMWxFWkJoRXVaTWFBS3dkQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJT0pucmh2bE5aU1F3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM01USXdOell3TWpBZQpGdzB5TmpBeU1UWXdNakEyTkRGYUZ3MHlPREEwTVRZd01qQTJOREphTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOekV5TURjMk1ESXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzlhWURhUEU5SlFoQm1IcWNUYVB2c2ZJWXdiU09JbWNrZQo5b3I2SHRZd1dld2x4OTd4ZW9TaUJmVUhCU3Yxd3FOM2hzUnJtc2lYMGFnbHcvYTRvMEphV0MwYmt1QU1kc2ZQCmNFVDdiaHVoL0h6OVUxVjRoa1ZrdXpOemNBZy9LS2RVUVBRUGwzSUEraFlZeW5HdnZiT21hcTlUeStXamt0YlIKQmh3VEp5TkRzZllwVVRwWFZKMXQ2TGlGQlpnV2NiWWJjNVh2cFdSdUIwTDRLVG53V0ZXZ0NCeHRMUExGN1JoQgpkSGtHUThZV2lYL2NHMU5wMlFzV05wKzBUT1A3bU9IaFdkQ0dvcE01dDkvcVk2ZHU2WjFWNTkrcElmOUdLRFZjCkw4c0tQekZra3Mxb2U0ZStRTE1TUE5jaWxNSzFYbWRnU3dJakpTakdtbU00QVhGT0sxN2hBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlR1SUpoSApnSVo1WFE1ekFBc005bjFRRXNvYzdqQWZCZ05WSFNNRUdEQVdnQlR1SUpoSGdJWjVYUTV6QUFzTTluMVFFc29jCjdqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFTODFwUlNSUXFOZ3NXYmdLa1JRdENyak5WN1FHZlRCMzhFWlcKUkNSZFlIbU9NQms2ZFZBcm4rYjRZb0w0dDl2d3laTzBBK2ZyY1V0MjAvdnFBYVdTTHhkR0VscDdkbVpzUU9iTgpnanFtRjZaRnFSa3lLMEg2WTBySExwRHhUSWRGZzQ1WVlIU3gxTUtaMTl0L3RLaFZpS1FMSlhZamtvbFliVEhPCjFpaG1RcFp4VTY5NHNMN3lUTWJQVUQ3emxybkN5Qm5POXYzRldIeEw3QjlyRlNvR0F6S1EybFhjaSszZ2lCb3UKcEhvTDUxZHlEQm9mck5kUlRtUzl1emhLZk9NRjh2eDJCcDFhNWkwSUpFYmg5RXRNODUwMWg5Wk5pRzVzNVcxSQo3L24zdm85ZkxLTVVEaVQ4RElaT0h0d1o1Sm9Jb0doT0txOUQrRjNZVW8rOHUrTFFmQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-02-16T02:07:06Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: ec51bcaf-a175-423f-bc39-0684d402d5fe service.beta.openshift.io/expiry: "2028-02-16T02:07:06Z" creationTimestamp: "2026-02-16T02:07:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ec51bcaf-a175-423f-bc39-0684d402d5fe"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-02-16T02:07:06Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: ec51bcaf-a175-423f-bc39-0684d402d5fe resourceVersion: "6240" uid: 2c79092b-d078-4654-95a0-20bfc0559872 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-02-16T02:22:59Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-02-16T02:22:59Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "13814" uid: e663c0fa-726f-4840-99f6-21946a605593 type: Opaque kind: SecretList metadata: resourceVersion: "55265"