--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2025-12-04T12:00:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fbe8bb9f-7f2e-4a04-8a18-4e327b2b6be5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-12-04T12:00:07Z" name: oauth-openshift-dockercfg-vxnhq namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: fbe8bb9f-7f2e-4a04-8a18-4e327b2b6be5 resourceVersion: "12351" uid: 201e645b-96d7-44b9-8aef-62dc2c3f1f14 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-12-04T11:38:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-04T11:38:02Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5727" uid: 2d60c1e2-e62d-42c1-9454-12984c5d136b type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2025-12-04T11:38:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-04T11:38:25Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "6758" uid: d84c7b46-0054-4407-9b59-8b197be94e50 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2027-12-04T11:38:12Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: b544fcc4-70c5-4416-8fda-b2b14a0caa79 service.beta.openshift.io/expiry: "2027-12-04T11:38:12Z" creationTimestamp: "2025-12-04T11:38:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b544fcc4-70c5-4416-8fda-b2b14a0caa79"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2025-12-04T11:38:12Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: b544fcc4-70c5-4416-8fda-b2b14a0caa79 resourceVersion: "6077" uid: 4d3b5186-c19f-4654-9225-7f40e0d484db type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2025-12-04T11:59:49Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2025-12-04T11:59:49Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "12062" uid: b515bf38-0f9e-4611-a328-387c36af1642 type: Opaque kind: SecretList metadata: resourceVersion: "47427"