--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-19T09:21:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8ec2f510-67f4-4e8c-82a3-50b2ad178289"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-19T09:21:21Z" name: oauth-openshift-dockercfg-2qc5w namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 8ec2f510-67f4-4e8c-82a3-50b2ad178289 resourceVersion: "8306" uid: 5816c712-4dcc-490c-8f34-506407ec6aaf type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T09:20:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T09:20:21Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "4750" uid: a9d0a3cb-dc31-4a05-a7f3-bde50c2b98f6 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-19T09:21:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T09:21:07Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "7297" uid: 7e83b239-9a6c-490b-9cd2-58ab2c8ccef8 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJY3pjR2VpaWJNNGt3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016a3hNakF6TlRBZQpGdzB5TmpBek1Ua3dPVEl3TXpaYUZ3MHlPREF6TVRnd09USXdNemRhTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF2V3NMc0ZodlZncjl6YXF2Z2RUSnNpblBFWU80VllwZQpTUWZyZ050cGdKaGRpU0dOcE13dlZzYU95SjN6aXFsSW1OOWxWUnBlYzVOZWtPck1FWHNmajREcTJRSkpNb0plClhzS2JHcjI2TmUrL0sxNW0wZTJCbXEwQ2RkbzFLNWtaVTZwcUwzSkVxQThkWWNCbmwwbVhrRks2RXN5QWZYY1UKY0F3QkorUlVIZWNEZThiM3JEYmc2b0dJMDRZNHN6VEpPUU55QVZBV3B2UTNlWDBZbm5jYnpobEFRZVpwaU9JKwpuSDdWMzJhb1lUOW4xN25ZdDJTTlViaUZRcS9wdVNCMnpzcjlieXloNi9oM0NXNlVDL1BnV0NVQzJZOCtScmxJCkpBVkhBTWtRTzFPbXdyTjBacEUyWGREdW9EaVZobHUyak8wcUFwakx6K01tNHJldGlsVmZuUUlEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGTjBQV0hiY29hUkZJVE5IS0lPYUg1eDdqUG45TUI4R0ExVWRJd1FZCk1CYUFGRDlIeE4zdUxVc3M3TFk5NTd1dmJ3Zmx3U1hpTUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkRJMk5HSXdZek5rTFRGaFl6QXROREUxTWkwNU5qTXpMV00xT0RRMU1tSXcKWmpZeU1qQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFFUmlMQU9BMTRqQzhlSCtrUmpzSkpYelRtNDNWN1Z0ZQo0SzFJQm5TcjJ4VWNLWE1mSXE1MHpDVURxcmx6QTRKNU42OWxUaUdJQzZURTFuV2gyejMreWpvSmkzMVYyUE84CjN3S0tPM0VlWXMyTDFKSnBJT09VZDZzU3pkWXQ2aFVOZFpBUGdzaHFObHRCUktpRnhhVzF5bUxMdlVFZmxEWjEKWGY4R0pxUjJrUXFZZ200NVlKVTREcGh6U2srdzFzTkhNZ1dvVUt2dDJXYTVubHhzZjkxa3FZNVY2S2VGUUNVbApaWnB6TkZyT3VTeUZwT1BodnlZQ0pVNnd2eG94bGFWTm9ydEI1Y0dnTjFGRE9DQUtaTHArYVJZUThtRXVxNjZvClFFa2RSRkk1WUNIT3FsZENwbmhMM2gvRFpSaVVwU1l1bFJkYXJybkRiVmFreFhIeGowbFNEZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJSUlqWktWTWNxajR3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016a3hNakF6TlRBZQpGdzB5TmpBek1Ua3dPVEl3TXpSYUZ3MHlPREExTVRjd09USXdNelZhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOek01TVRJd016VXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzJGOHVPKzVQbGJIaTRMUm9oRURYb2FqZi9oa0w1b1lsVgp0MVB3d0dpcXhhaVFzWmxrVE1YdnJreS9WTlhURThiN0RyMWFIRkZtRzhUemJIbHg2Um5DbG94Um1iTy8wRDZmCkN5amUyRVlWSVgzUVAwUUV4ZGt1b1E4UmJ3OVFreGlVZHoyMEF3aUlBbGRVNit5REI2cTZCemgybnNCREptaTkKemdVcm5tbXRlbXR0bzlqNDhPVnVRN1hUTUg5RHdPRnA5UzFRazg4b0psVzQ2NUJVK0lxc0o2WjdGdG1tVVliMwo5am9sL043TmRiWlRTcTk0Nm1LamFlaWZXSVczS3dEd3E4TFpjazd3WVhxYUIvNmJPU3NUWGMycUxLR3VsS1YyCnpiZG1TcEpMUHliRnliYTc1OSt3YWVJL3BlYS84YURqdWF6SGdKRWFwUmgrbStoQTBvOHJBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlEvUjhUZAo3aTFMTE95MlBlZTdyMjhINWNFbDRqQWZCZ05WSFNNRUdEQVdnQlEvUjhUZDdpMUxMT3kyUGVlN3IyOEg1Y0VsCjRqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFKS1NNcEZabTE0R3F2ekZyS2VkbFU4MVdEV2NJTTUyMU5kejQKeGJNQjNCbE1WelFadnord0J2YnI1Q3lUakQ5cFFiZlY0WG05OHl1d1M1bFJYa3c3bTI4OEpNVldqdzBUa0xBZApjaE5IWWkxdVV0NStST2RwNTJKSjE2aFI5Q1BPQzl0eXpFb1RrVXZpTnQyVE85ZVJodXRQeCs4a0NpckRHWGlnClptaFNVM2wvSFZWaVMvQkt6MkF6TWc4ckMzRlBlSFh0Vkh0MjR2WmloTXJDbVhZM1JadXpmdU8rQ01VZ1ozQkgKN0pKc0g5NUtORlVZZWw3UGp2REtHK3pFSDN3UlJEcTVpYS9ieXp1RkRmTktrRm9UNS9MY3k5RkhCQ0Q1TDNNUgpqOFlwOFBmQlJUN3ZzQVZXejRvOXdFRDhzUjE5VmxyYzh0d3BEbHpINkkyaFFkdUlTZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-18T09:20:37Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 264b0c3d-1ac0-4152-9633-c58452b0f622 service.beta.openshift.io/expiry: "2028-03-18T09:20:37Z" creationTimestamp: "2026-03-19T09:20:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"264b0c3d-1ac0-4152-9633-c58452b0f622"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-19T09:20:37Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 264b0c3d-1ac0-4152-9633-c58452b0f622 resourceVersion: "5524" uid: 3b90ea88-f2db-48fb-9a8e-773e43394a9f type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T09:25:33Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T09:35:17Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "15656" uid: c8ae340e-8838-4e49-b8a9-3a8633f9c86d type: Opaque kind: SecretList metadata: resourceVersion: "75264"