--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-19T12:14:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"011a123a-f5b2-4898-b1f2-87f94f852ad8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-19T12:14:52Z" name: oauth-openshift-dockercfg-5xkbm namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 011a123a-f5b2-4898-b1f2-87f94f852ad8 resourceVersion: "14410" uid: d7aa8f5e-cd87-4c8c-a6f6-53e880ce7e46 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T11:54:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T11:54:07Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5643" uid: 026fbe2f-7ad2-4281-b705-995d14e3ecc1 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-19T11:54:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T11:54:46Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "8065" uid: 2af00504-1c44-41cf-aeb7-e6bf217f5939 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-18T11:54:18Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 8b534a6d-218d-4012-b562-1d87fdc7001f service.beta.openshift.io/expiry: "2028-03-18T11:54:18Z" creationTimestamp: "2026-03-19T11:54:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8b534a6d-218d-4012-b562-1d87fdc7001f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-19T11:54:19Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 8b534a6d-218d-4012-b562-1d87fdc7001f resourceVersion: "6319" uid: 53f09742-97da-4020-91eb-a3d048bb58e3 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T12:17:30Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T12:17:30Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "16997" uid: 32e4dbae-0241-4210-ac8d-44768a96a492 type: Opaque kind: SecretList metadata: resourceVersion: "76440"