--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-20T08:39:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cf44cc47-b849-42c3-98d8-7bf25274c80c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-20T08:39:08Z" name: oauth-openshift-dockercfg-scgh2 namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: cf44cc47-b849-42c3-98d8-7bf25274c80c resourceVersion: "9499" uid: 085f10f8-7d55-4cf7-90a8-a10223203539 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-20T08:36:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-20T08:36:36Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5610" uid: 4f81b202-5be6-4efa-825e-123ce35053b0 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-20T08:36:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-20T08:36:49Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6641" uid: 1580a55d-1cf0-4efe-b270-6fe603b797a6 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-19T08:36:45Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 8757aba8-6841-4c50-a6d0-b24c940211fa service.beta.openshift.io/expiry: "2028-03-19T08:36:45Z" creationTimestamp: "2026-03-20T08:36:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8757aba8-6841-4c50-a6d0-b24c940211fa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-20T08:36:45Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 8757aba8-6841-4c50-a6d0-b24c940211fa resourceVersion: "6434" uid: fbc00170-33b2-44a1-8c51-8cd398346930 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-20T08:41:38Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-20T08:41:38Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "12214" uid: 1ed0e3f9-49c9-40c5-8919-2a95d4bf582c type: Opaque kind: SecretList metadata: resourceVersion: "76641"