--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: oauth-openshift creationTimestamp: "2026-03-07T21:15:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"62f9f05c-f206-44b5-b598-35cbabcf0c43"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-07T21:15:33Z" name: oauth-openshift-dockercfg-x8pfn namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: ServiceAccount name: oauth-openshift uid: 62f9f05c-f206-44b5-b598-35cbabcf0c43 resourceVersion: "8603" uid: 6be6c064-af34-4ad2-b214-a15a7072e8e4 type: kubernetes.io/dockercfg - apiVersion: v1 data: errors.html: MTQzNTQ2IGJ5dGVzIGxvbmc= login.html: MTc5NTYyIGJ5dGVzIGxvbmc= providers.html: MTU5ODE4IGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-07T21:15:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:errors.html: {} f:login.html: {} f:providers.html: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-07T21:15:02Z" name: v4-0-config-system-ocp-branding-template namespace: openshift-authentication resourceVersion: "6097" uid: 372a5548-0b92-4787-a5e7-656235ee957f type: Opaque - apiVersion: v1 data: apps.sno.openstack.lab: NDAzNSBieXRlcyBsb25n kind: Secret metadata: creationTimestamp: "2026-03-07T21:15:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:apps.sno.openstack.lab: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-07T21:15:18Z" name: v4-0-config-system-router-certs namespace: openshift-authentication resourceVersion: "7000" uid: d457d76a-3af9-400f-9cea-44a58d4f09b6 type: Opaque - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/oauth-openshift with hostname oauth-openshift.openshift-authentication.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: v4-0-config-system-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-06T21:15:10Z" service.alpha.openshift.io/originating-service-name: oauth-openshift service.alpha.openshift.io/originating-service-uid: 43cbdb27-e4b2-49ba-8f95-fcdbb948f8c2 service.beta.openshift.io/expiry: "2028-03-06T21:15:10Z" creationTimestamp: "2026-03-07T21:15:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"43cbdb27-e4b2-49ba-8f95-fcdbb948f8c2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-07T21:15:10Z" name: v4-0-config-system-serving-cert namespace: openshift-authentication ownerReferences: - apiVersion: v1 kind: Service name: oauth-openshift uid: 43cbdb27-e4b2-49ba-8f95-fcdbb948f8c2 resourceVersion: "6383" uid: 4f1e745c-46e4-4931-970c-a01b2ccb7fc9 type: kubernetes.io/tls - apiVersion: v1 data: v4-0-config-system-session: MjAzIGJ5dGVzIGxvbmc= kind: Secret metadata: creationTimestamp: "2026-03-07T21:22:06Z" labels: app: oauth-openshift managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:v4-0-config-system-session: {} f:metadata: f:labels: .: {} f:app: {} f:type: {} manager: authentication-operator operation: Update time: "2026-03-07T21:26:39Z" name: v4-0-config-system-session namespace: openshift-authentication resourceVersion: "14487" uid: c0fa583e-e54c-4554-9104-3fa899cccb2d type: Opaque kind: SecretList metadata: resourceVersion: "43984"