--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-18T08:49:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e8c7c18a-7668-429d-814d-3ae94649d065"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T08:49:51Z" name: oauth-openshift-dockercfg-6n58x namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: e8c7c18a-7668-429d-814d-3ae94649d065 resourceVersion: "7962" uid: 30c78802-6124-47e5-9460-e0504d9e32d3 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-18T08:49:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-18T08:49:18Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "5784" uid: 02e0d576-a7f3-4241-8ad0-10d995af596a type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-18T08:49:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-18T08:49:51Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "8072" uid: 97133746-0187-4474-bffe-b0d50203c066 type: Opaque - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVGRENDQXZ5Z0F3SUJBZ0lJVmpWbnE4M3hEWHN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016Z3lNemMwTnpBZQpGdzB5TmpBek1UZ3dPRFE1TWpSYUZ3MHlPREF6TVRjd09EUTVNalZhTURjeE5UQXpCZ05WQkFNVExHOWhkWFJvCkxXOXdaVzV6YUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUFvbzBtUW1MOThMU1JpMmFmRGV0S2F5cU9CNnhLQ0w3RwpVR3VaalhGMVFmVHNkU0R2VUNJZ0Z1N3RYZW5ZZ2wyMytLM2tpQ1BCSTJlczdjWXl1eGNwc3o3UGV5MHhTTklPCjN6dVBVd1RFNFM5SW5jZzNrSTZNTThlSkhEL3BFWU5DbXErVng5VUY4TW1vRWNjUWtMTUV6VUNWTFJ4REhHOEcKZUp1b0lYODBjR2dKcHJwQVhFKzNrdEFlcGptZUlDSFFvNFFvQ3REaThGc01DOWRQYi9DTTNUQy9EdjBUNmNDMwpMTFhvdFRnZEhzRVhIeHFQYUVlbUlDNTkxRnQwVUxabkVRRlQ1emZSa0Q2Um8yVERveU9NRzNTTHI2eEJEY25JCklmMDV5SGpGRlprVDZuN2R4QmttTWtwa3RFT2ZWVHFXN2NQOGtJRnRCVVc0UVJTSGE4K0RUd0lEQVFBQm80SUIKSXpDQ0FSOHdEZ1lEVlIwUEFRSC9CQVFEQWdXZ01CTUdBMVVkSlFRTU1Bb0dDQ3NHQVFVRkJ3TUJNQXdHQTFVZApFd0VCL3dRQ01BQXdIUVlEVlIwT0JCWUVGTU5MeXNHVGIzV1plM2JVYVNEdXhINk12SlJGTUI4R0ExVWRJd1FZCk1CYUFGTkQrRW9ybUROTG1KNDRQbFVoNjgrcE5kMWs4TUhNR0ExVWRFUVJzTUdxQ0xHOWhkWFJvTFc5d1pXNXoKYUdsbWRDNXZjR1Z1YzJocFpuUXRZWFYwYUdWdWRHbGpZWFJwYjI0dWMzWmpnanB2WVhWMGFDMXZjR1Z1YzJocApablF1YjNCbGJuTm9hV1owTFdGMWRHaGxiblJwWTJGMGFXOXVMbk4yWXk1amJIVnpkR1Z5TG14dlkyRnNNRFVHCkN5c0dBUVFCa2dnUlpBSUJCQ1lUSkRObFpEbGhZalZsTFROaE0yUXROR1k1WkMxaFptTTRMVGN3WW1NeFpqWmsKWVRRNE1qQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFXcGR6bXBLMzJlQllZbnJNZlpESlRFazBqd21lTXFaZApKOERlb1J2ajlPK3k0eTR6RVcwWUs2VDBRVzNTbllUNUlMNW1jRThFNzVzSkw5WmVtUmQwVlkxYVhWbE9VZnMwCm9RcGQ0M2V1SXJyZElEZ21BWmRQOEsxRHRnQTBMVnpTSmEwbXM5MlZYRkxsbDAxT01XVzZPaWpPN1R3MnltQjYKcnd2bVRvOXJROWZaMWtpMCtzbElPZEtEUDBLS2dab2ZFTVk2OUNUN2UzeUxjbDNvWTJWTU8rc1BONzBWdVpxMgpUQzM2N0ZzMGhTWU9ZVnJOUXpMS01wNVo0MzMyT1g4MFBVYm1ZY0trT2VXamR4aGdSL2luK1BwSFBNMDBkT3pHCm92SHBiYzZNWXRxMUpmOC8rYU5zdUxPYzJPNXI0SStYdFcxOGQ4eHlSdkF5Vkwvd3lQOHlUQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJQVZiU1dXMG1mRDB3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016Z3lNemMwTnpBZQpGdzB5TmpBek1UZ3dPRFE1TURaYUZ3MHlPREExTVRZd09EUTVNRGRhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOek00TWpNM05EY3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ29oaVhIZjRsME1rRzNkODZpdDJOUnVKR1B6OFN2ai9ESQpVL3pFNnhqTlBTbjdJcUZEbkJlMXRFMnlVbUtIa0RpS3JwQWR6cXB1UGZLRUt3NGpiczllakRqTFRXaDZjTTZnCkNnUk5BdE1rM1pUd1FRSURnOU55K3BTdTU0UjJvbXN2Y2FodGxjc0ZxK1g4TFZoNUFGdk8zbGEwVEErKzBTTkQKcWZuSlN4T2tJTEgwU1ovMEVIVHcxamhpN0VSRVREWERRSXVqQUdBNWIxdy9CYWFPczlNcFZPeml4UktNT21USApQWTFibmg1TG5rWHVDaHdmKzBWYnNsdVFmdnc2SXVjeFJjVENzTGNNd1lRRERlclZOSDQ0eGt3VDlYMkV1M3BXCjk1VER6aFE3R0hrZnR2dkhQdHZsbjhQT3BYMGVIRm9Pd0hNWFNuOE1tYURZeVVYbk1iREhBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlRRL2hLSwo1Z3pTNWllT0Q1VklldlBxVFhkWlBEQWZCZ05WSFNNRUdEQVdnQlRRL2hLSzVnelM1aWVPRDVWSWV2UHFUWGRaClBEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFoNFQ2dFZ2djJLcjd4SU5lYkpEOE1jUm5yZFh5TlFWZXJyZHIKNk1IaU9FL2E1cEFIb3lpb0pUN3VoekNGMDhVeFh1WW40QnA2SUVjbjhPZDdMWlJMRjR1RlV4ZlBqcnVQSTJ0YgpVTXJHMWtodlpwTVRabmRkK2dvbXNCcDRaSUJoT1R4b2xOMStSWWVRT09WcFRtcWxtbEYxeVl4cnliMG5EL2Z6Ckd5cDBUd0J3UHhRam9NRzJYcVRVWE9NUG9VZGk2L2I3Qk1neUpRc29kSitzM3QwbjVta014akp6RnNZcS95S3UKMTltbEp0ZitxaGRLRElLRkcyRW9ueDVGc2pOb1FkMDI5eW5UY3BnYlRIVkM0QVF6N1RObG12cm1zMjVITHJyOQpKeG5EQWt4Ny93czNsMFV5dDJScGV1eEMzQlY3c3pRMDRud0hOQjJNeHBYZFVBUGRLZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T08:49:25Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 3ed9ab5e-3a3d-4f9d-afc8-70bc1f6da482 service.beta.openshift.io/expiry: "2028-03-17T08:49:25Z" creationTimestamp: "2026-03-18T08:49:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"3ed9ab5e-3a3d-4f9d-afc8-70bc1f6da482"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T08:49:26Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 3ed9ab5e-3a3d-4f9d-afc8-70bc1f6da482 resourceVersion: "6270" uid: 09365f42-2d0e-48b2-ac66-cef5d7e93f90 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-18T09:04:38Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-18T09:04:38Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "14528" uid: 1f1c4c1c-35ea-46b3-a767-95b7d5514327 type: Opaque kind: SecretList metadata: resourceVersion: "25068"