openshift / origin

Conformance test suite for OpenShift
http://www.openshift.org
Apache License 2.0
8.49k stars 4.7k forks source link

service-catalog controller-manager does not have required permissions. #19163

Closed jmontleon closed 6 years ago

jmontleon commented 6 years ago

service-catalog controller-manager does not have required permissions.

Version
oc v3.10.0-alpha.0+b86ce00-440
kubernetes v1.9.1+a0ce1bc657
features: Basic-Auth GSSAPI Kerberos SPNEGO

Server https://172.17.0.1:8443
openshift v3.10.0-alpha.0+c232b23-442
kubernetes v1.9.1+a0ce1bc657
Steps To Reproduce

oc cluster up --service-catalog=true

Current Result

controller-manager logs are full of 'E0330 07:57:44.442207 1 leaderelection.go:224] error retrieving resource lock kube-service-catalog/service-catalog-controller-manager: endpoints "service-catalog-controller-manager" is forbidden: User "system:serviceaccount:kube-service-catalog:service-catalog-controller" cannot get endpoints in the namespace "kube-service-catalog": User "system:serviceaccount:kube-service-catalog:service-catalog-controller" cannot get endpoints in project "kube-service-catalog": clusterrole.rbac.authorization.k8s.io "service-catalog-controller" not f ound'

Expected Result

controller-manage works correctly.

Additional Information

This was working up until today.

# oc adm diagnostics
[Note] Determining if client configuration exists for client/cluster diagnostics
Info:  Successfully read a client config file at '/root/.kube/config'
Info:  Using context for cluster-admin access: 'default/172-17-0-1:8443/admin'

[Note] Running diagnostic: ConfigContexts[default/127-0-0-1:8443/system:admin]
       Description: Validate client config context is complete and has connectivity

Info:  For client config context 'default/127-0-0-1:8443/system:admin':
       The server URL is 'https://127.0.0.1:8443'
       The user authentication is 'system:admin/127-0-0-1:8443'
       The current project is 'default'
       Successfully requested project list; has access to project(s):
         [ansible-service-broker default kube-dns kube-proxy kube-public kube-service-catalog kube-system myproject openshift openshift-apiserver ...]

[Note] Running diagnostic: ConfigContexts[myproject/127-0-0-1:8443/developer]
       Description: Validate client config context is complete and has connectivity

Info:  For client config context 'myproject/127-0-0-1:8443/developer':
       The server URL is 'https://127.0.0.1:8443'
       The user authentication is 'developer/127-0-0-1:8443'
       The current project is 'myproject'
       Successfully requested project list; has access to project(s):
         [myproject]

[Note] Running diagnostic: ConfigContexts[myproject/172-17-0-1:8443/admin]
       Description: Validate client config context is complete and has connectivity

Info:  For client config context 'myproject/172-17-0-1:8443/admin':
       The server URL is 'https://172.17.0.1:8443'
       The user authentication is 'admin/172-17-0-1:8443'
       The current project is 'myproject'
       Successfully requested project list; has access to project(s):
         [ansible-service-broker default kube-dns kube-proxy kube-public kube-service-catalog kube-system myproject openshift openshift-apiserver ...]

[Note] Running diagnostic: ConfigContexts[myproject/172-17-0-1:8443/system:admin]
       Description: Validate client config context is complete and has connectivity

ERROR: [DCli0013 from diagnostic ConfigContexts@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/config_contexts.go:292]
       For client config context 'myproject/172-17-0-1:8443/system:admin':
       The server URL is 'https://172.17.0.1:8443'
       The user authentication is 'system:admin/172-17-0-1:8443'
       The current project is 'myproject'
       (*errors.StatusError) projects.project.openshift.io is forbidden: User "system:anonymous" cannot list projects.project.openshift.io at the cluster scope: User "system:anonymous" cannot list all projects.project.openshift.io in the cluster

       This means that when we tried to make a request to the master API
       server, your kubeconfig did not present valid credentials to
       authenticate your client. Credentials generally consist of a client
       key/certificate or an access token. Your kubeconfig may not have
       presented any, or they may be invalid.

[Note] Running diagnostic: ConfigContexts[/172-17-0-1:8443/developer]
       Description: Validate client config context is complete and has connectivity

ERROR: [DCli0015 from diagnostic ConfigContexts@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/config_contexts.go:292]
       For client config context '/172-17-0-1:8443/developer':
       The server URL is 'https://172.17.0.1:8443'
       The user authentication is 'developer/172-17-0-1:8443'
       The current project is 'default'
       (*errors.StatusError) Unauthorized
       Diagnostics does not have an explanation for what this means. Please report this error so one can be added.

[Note] Running diagnostic: ConfigContexts[default/172-17-0-1:8443/system:admin]
       Description: Validate client config context is complete and has connectivity

Info:  For client config context 'default/172-17-0-1:8443/system:admin':
       The server URL is 'https://172.17.0.1:8443'
       The user authentication is 'system:admin/127-0-0-1:8443'
       The current project is 'default'
       Successfully requested project list; has access to project(s):
         [ansible-service-broker default kube-dns kube-proxy kube-public kube-service-catalog kube-system myproject openshift openshift-apiserver ...]

[Note] Running diagnostic: DiagnosticPod
       Description: Create a pod to run diagnostics from the application standpoint

Info:  Output from the diagnostic pod (image openshift/origin-deployer:v3.10.0-alpha.0):
       [Note] Running diagnostic: PodCheckAuth
              Description: Check that service account credentials authenticate as expected

       Info:  Service account token successfully authenticated to master
       Info:  Service account token was authenticated by the integrated registry.
       [Note] Running diagnostic: PodCheckDns
              Description: Check that DNS within a pod works as expected

       [Note] Summary of diagnostics execution (version v3.10.0-alpha.0+2755ea7):
       [Note] Completed with no errors or warnings seen.

[Note] Skipping diagnostic: AggregatedLogging
       Description: Check aggregated logging integration for proper configuration
       Because: Logging project does not exist

[Note] Running diagnostic: AppCreate
       Description: Create an application and test that it deploys correctly.

I0330 10:33:23.699380    3157 logs.go:41] Unsolicited response received on idle HTTP channel starting with "HTTP/1.0 200 OK\r\nContent-Type: text/plain\r\n\r\nHello\r\n"; err=<nil>
Info:  10:33:15.838: Using project 'openshift-diagnostic-appcreate-kgpqc' for diagnostic.
Info:  10:33:21.612: App 'diagnostic-appcreate' is running
Info:  10:33:23.16: Request to service address http://172.30.163.105:8080/ succeeded
Info:  10:33:26.895: Request to route http://diagnostic-appcreate-openshift-diagnostic-appcreate-kgpqc.172.17.0.1.xip.io:80/ succeeded
Info:  App creation and readiness completed with success=true in 5.362467792s
Info:  Service creation and testing completed with success=true in 1.548296707s
Info:  Route creation and testing completed with success=true in 3.734483268s
Info:  Entire create/test completed with success=true in 11.05664512s

[Note] Running diagnostic: ClusterRegistry
       Description: Check that there is a working Docker registry

[Note] Running diagnostic: ClusterRoleBindings
       Description: Check that the default ClusterRoleBindings are present and contain the expected subjects

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected.

       Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects.

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount  horizontal-pod-autoscaler openshift-infra}.

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected.

       Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects.

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount  horizontal-pod-autoscaler kube-system}.

[Note] Running diagnostic: ClusterRoles
       Description: Check that the default ClusterRoles are present and contain the expected permissions

Info:  clusterrole/admin has changed, but the existing role has more permissions than the new role.

       If you can confirm that the extra permissions are not required, you may use the
       'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
       For example,

         $ oc adm policy reconcile-cluster-roles \
                --additive-only=false --confirm

Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["impersonate"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["localsubjectaccessreviews"], APIGroups:["authorization.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["localresourceaccessreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["localsubjectaccessreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["subjectrulesreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["localresourceaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["localsubjectaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["subjectrulesreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyselfsubjectreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicysubjectreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyreviews"], APIGroups:["security.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyselfsubjectreviews"], APIGroups:["security.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicysubjectreviews"], APIGroups:["security.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:["authorization.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:["authorization.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:["authorization.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/details"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["builds/details"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["admin"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["edit"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["view"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:["route.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourceaccessreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["subjectaccessreviews"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["resourceaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["subjectaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["watch"]}.

Info:  clusterrole/edit has changed, but the existing role has more permissions than the new role.

       If you can confirm that the extra permissions are not required, you may use the
       'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
       For example,

         $ oc adm policy reconcile-cluster-roles \
                --additive-only=false --confirm

Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["impersonate"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/details"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["builds/details"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["edit"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["view"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:["apps.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:["image.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:["route.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["watch"]}.

Info:  clusterrole/view has changed, but the existing role has more permissions than the new role.

       If you can confirm that the extra permissions are not required, you may use the
       'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
       For example,

         $ oc adm policy reconcile-cluster-roles \
                --additive-only=false --confirm

Info:  clusterrole/view has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["view"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}.

[Note] Running diagnostic: ClusterRouter
       Description: Check there is a working router

[Note] Running diagnostic: MasterNode
       Description: Check if master is also running node (for Open vSwitch)

WARN:  [DClu3004 from diagnostic MasterNode@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/master_node.go:167]
       Unable to find a node matching the cluster server IP.
       This may indicate the master is not also running a node, and is unable
       to proxy to pods over the Open vSwitch SDN.

[Note] Skipping diagnostic: MetricsApiProxy
       Description: Check the integrated heapster metrics can be reached via the API proxy
       Because: The heapster service does not exist in the openshift-infra project at this time,
       so it is not available for the Horizontal Pod Autoscaler to use as a source of metrics.

[Note] Running diagnostic: NetworkCheck
       Description: Create a pod on all schedulable nodes and run network diagnostics from the application standpoint

Info:  Skipping network diagnostics check. Reason: Not using openshift network plugin.

[Note] Running diagnostic: NodeDefinitions
       Description: Check node records on master

[Note] Running diagnostic: RouteCertificateValidation
       Description: Check all route certificates for certificates that might be rejected by extended validation.

[Note] Skipping diagnostic: ServiceExternalIPs
       Description: Check for existing services with ExternalIPs that are disallowed by master config
       Because: No master config file was detected

[Note] Summary of diagnostics execution (version v3.10.0-alpha.0+b86ce00-440):
[Note] Warnings seen: 1
[Note] Errors seen: 2
jpeeler commented 6 years ago

This does look wrong: $ oc get role.rbac endpoint-accessor -o yaml Error from server (NotFound): roles.rbac.authorization.k8s.io "endpoint-accessor" not found

Output in the past looked like:

apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: creationTimestamp: 2017-11-10T21:20:17Z name: endpoint-accessor namespace: kube-service-catalog resourceVersion: "777" selfLink: /apis/rbac.authorization.k8s.io/v1beta1/namespaces/kube-service-catalog/roles/endpoint-accessor uid: f2cae8be-c65c-11e7-adac-5254006c61d5 rules:

Will follow up with @deads2k on Monday.

jpeeler commented 6 years ago

The endpoint-accessor rolebinding is getting created in the default namespace rather than the correct kube-service-catalog namespace. Adding the namespace to the metadata in my testing has not solved the problem yet...

enj commented 6 years ago

@jmontleon @jpeeler fixed by #19288