--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-19T12:10:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a015b637-3895-4c08-838f-78014265b11e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-19T12:10:21Z" name: oauth-openshift-dockercfg-nbxfb namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: a015b637-3895-4c08-838f-78014265b11e resourceVersion: "15193" uid: d0d743a7-8d50-4eb6-ad93-b9e1033cbac2 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T11:54:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T11:54:24Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5547" uid: 4f1ecce7-aef9-4827-9ec4-b39a7f6300e1 type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzOSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-19T11:54:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T11:54:59Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "7457" uid: a78c1610-d34a-4399-9d95-6ba15c24abe7 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-18T11:54:37Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 74f18bc1-bd8d-41e7-aac7-6154d4c5e82b service.beta.openshift.io/expiry: "2028-03-18T11:54:37Z" creationTimestamp: "2026-03-19T11:54:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"74f18bc1-bd8d-41e7-aac7-6154d4c5e82b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-19T11:54:38Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 74f18bc1-bd8d-41e7-aac7-6154d4c5e82b resourceVersion: "6462" uid: 65862cb3-5a33-4fc6-b396-b19fd25cb59a type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-19T12:12:53Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-19T12:12:53Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "17372" uid: b5af3553-ec3a-4060-a3b5-ef0570f8f11b type: Opaque kind: SecretList metadata: resourceVersion: "50753"