--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-19T09:19:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f8f3c7c1-3052-4c90-970e-4fc66b58625e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-19T09:19:25Z" name: oauth-openshift-dockercfg-fmdhh namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: f8f3c7c1-3052-4c90-970e-4fc66b58625e resourceVersion: "7871" uid: 1b805183-1f9c-4816-8ae9-cb59a94a0b52 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T09:19:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T09:19:03Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6334" uid: 38f7488d-58cf-4a3a-b415-5fa45a6bf1b3 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-19T09:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T09:26:30Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "11451" uid: 3d286428-a0bd-4567-aac9-9e3d616c52cc type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJWXVLY2NwcnNQR3N3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016a3hNVGt6TXpBZQpGdzB5TmpBek1Ua3dPVEU1TVRCYUZ3MHlPREF6TVRnd09URTVNVEZhTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF3TGlrVllEMjdvL28yOFVIVXJLREdYVTExeHpqb1VvKwpCN01sWFp3RUp3aDN2UnQ5eUk0TXRRSXA3RGtoZjluaGdyTlhUY1JEc0t6Y2xOSlBRMjN6SkhybVlpWE8vdHVDCnljc1UwdkhuMmhoUndrNVQrQldSZHJwTFpmbnEyaVBkNUhxODgwYXJIQ3BRMlcxVHV0VlNnd3YyYjJtRi9JRkMKTkEwRmlQZWI3RjYxc2p2VjROckM2RVdhOGRGbnJFVTF2WklOMWJUN0REOXpZekNnOVZ5ZHorNzhUcUNnNC9VVgo0N01BMlBjWXFrUmkwdlRPSkY0Q2d0ZVJXZWYzb0huTkxmREhZenlIQ0ZWVWw5bkRyQWpOeDlWWlBsV1U1UGNmCnU1K0ZwMTF4TmcwWDNHQUM3Umw4U284bENabHhiZDQ2bGxHZ3B0aTJXd0s3ek52M2FhTGhoUUlEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGR29zQ0wxR29ydHRMSVIxS2w1bXdqYktxeFVLTUI4R0ExVWRJd1FZCk1CYUFGTWlxbjMyZmg4eVhtUm5jYXVQVTNYUDBnVXNjTUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkdNelltWmhPRGN4TFRGaVl6WXRORFUxTlMxaFpXRTJMV1ZqWlRFME5URTEKT0RreFlqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFzUEc1Mkl6ZnFHNU1mMS9SZEFTamxreTRlN0ZLbHhpegpVYm56Q0hqbDVFRm9DN0hKK3A4anlIMldhOEVMRlEwUmRMd0dXNE94T2lxcnFnZXJjNVVNdXRLRm1ZeGVqMHQrCnd3QVlaUk55cmMxL3Y0ZC9YNDVqSFFYVWM1aFhPdW5ER1ZTMEpyWXowcjRDT09hL05XVUdoYlhSMkQyMlZKYSsKT1laOVhDZVNDTkJTSTVHaHVHUkU4NzlUQnRIWFFNWVlYR1JmR2NCZUdpbzdKSGdBZmk3c1lLa1cyWHVRbno1Zwp6M1F4MFF4cFVvWm1jeWEvU05DZm16UFJmU1ZNalRHU0g1SGpPSVJjd2ZFcHc0VTFtRElsSWJsQWYxbmlqcHZSCno3YmRYeHhub3BNdnBxSUtoWnlzVzRrMTE4VnFIay9EbTNTNllHVVpEL0U3SEhLeWkxU0FZUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJUDZ4Y0w2eENuL0l3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016a3hNVGt6TXpBZQpGdzB5TmpBek1Ua3dPVEU0TlRKYUZ3MHlPREExTVRjd09URTROVE5hTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOek01TVRFNU16TXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzMwSkx5M3c0L1FaMXJwVTE0ZXNoZ3lXTk5jYitVR0NPYQpnOUNmNzYxQXpEcWZBMW9rWHJVYUQ1WG1LbWxacms2ZG9MZVFQdWFJQ2xDM0duNHZWb3ZNZHM3UGV2dnIvVE5FCldpM2NMQWxQajBLZXAxMk5BbXlrald5SzRwbWcvV1dsc3R5Q3lFNzM2VnVpZmlCOXdDMGF1STdjM3dUakczek4KTElHZDFYSGd0RnZqajdkaTlBa0Y0TUZQT09JK09NUmpVaWZHdVVQcllmbDhwOTROb2F6cXFTaWFJbTRGSjNxLwpPMWxIZjJJZVRLYnYxTlpDVGRDbzdTN0xHWDNBSWlNSWtabzFXdzB2SDJMcGVHYitqNndINlhuMDd3STYreHdkCkl5NXp4WnBDWkxTazNqM09KS0dLOWxpQ3V6bVcrc2E0OHBVMmpkK3VZR2ttWUovaU9ZMUhBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlRJcXA5OQpuNGZNbDVrWjNHcmoxTjF6OUlGTEhEQWZCZ05WSFNNRUdEQVdnQlRJcXA5OW40Zk1sNWtaM0dyajFOMXo5SUZMCkhEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFlaGQrK0VCZy9LdEhrcDJYb0UwV2pUVHR2S3FucktLeW16Q0IKSzBsYWV4M1h4Wmd4YUJyR0grR2RtU3VDUmI4em5QVmZnTmNmUFN1WWFGOXppVXhzUlNETWpuUjlJRGxhYlRYeQprcTVzZDFDckR4eisyVVZaRURYNm5JU2RBZGZKM2RTVkJhMzg3cjlHMlRTZ24rVzRrVEVCWWcvWXpSUGtyc2duCnNJUnFpVXcrbitjSEJEUERXR2lNaUx4WDQ5Qmg1c2F1UzFUT2s5RTlZVW84dldYN1ZMcGRsOFM4N3dQVVhnNmIKaTBSVlZNOEJEd2lZaXNLcWNoQXA2bHRwUlIwTWtwY2RDVU15UE9tMDhGU2xJYnpRN1diMVJYNHEySHhEUUpGdwp4V0E2aVVxMHhrc1NNYXRsTW00SlcvRHVLREV1cmJoQ295OFh4amhnTE92YTFhRXdidz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-18T09:19:11Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: c3bfa871-1bc6-4555-aea6-ece14515891b service.beta.openshift.io/expiry: "2028-03-18T09:19:11Z" creationTimestamp: "2026-03-19T09:19:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c3bfa871-1bc6-4555-aea6-ece14515891b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-19T09:19:11Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: c3bfa871-1bc6-4555-aea6-ece14515891b resourceVersion: "6910" uid: 84006565-a08b-46ed-a223-a3d8a66d1f26 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T09:33:59Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T09:33:59Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "13794" uid: 6123cf18-caff-4319-b4bc-c74edad4a005 type: Opaque kind: SecretList metadata: resourceVersion: "49045"