Origin: User system:anonymous cannot get on /console/ in OKD

Created on 14 Sep 2018  路  8Comments  路  Source: openshift/origin

While accessing OKD wenconsole (https://c1-ocp:8443/console/) i am getting following error

{
  "kind": "Status",
  "apiVersion": "v1",
  "metadata": {},
  "status": "Failure",
  "message": "forbidden: User \"system:anonymous\" cannot get path \"/console/\": User \"system:anonymous\" cannot \"get\" on \"/console/\"",
  "reason": "Forbidden",
  "details": {},
  "code": 403
}

Version

[root@c1-ocp openshift-origin-server-v3.10.0-dd10d17-linux-64bit]# ./openshift version
openshift v3.10.0+dd10d17

Steps To Reproduce
  1. Install OKD "All-in-One Server" using below links
    https://docs.okd.io/latest/getting_started/administrators.html#downloading-the-binary

  2. Follow steps as mentioned in guideline to start openshift and access
    $ export PATH="$(pwd)":$PATH
    Launch the server:
    sudo ./openshift start

  3. Access https://c1-ocp:8443/console/

Current Result
{
  "kind": "Status",
  "apiVersion": "v1",
  "metadata": {},
  "status": "Failure",
  "message": "forbidden: User \"system:anonymous\" cannot get path \"/console/\": User \"system:anonymous\" cannot \"get\" on \"/console/\"",
  "reason": "Forbidden",
  "details": {},
  "code": 403
}

Expected Result

Console should be available

Additional Information

[try to run $ oc adm diagnostics (or oadm diagnostics) command if possible]

[root@c1-ocp openshift-origin-server-v3.10.0-dd10d17-linux-64bit]# ./oc adm diagnostics
[Note] Determining if client configuration exists for client/cluster diagnostics
Info:  Successfully read a client config file at '/home/vagrant/openshift-origin-server-v3.10.0-dd10d17-linux-64bit/openshift.local.config/master/admin.kubeconfig'
Info:  Using context for cluster-admin access: 'default/10-0-2-15:8443/system:admin'

[Note] Running diagnostic: ConfigContexts[default/10-0-2-15:8443/system:admin]
       Description: Validate client config context is complete and has connectivity

Info:  The current client config context is 'default/10-0-2-15:8443/system:admin':
       The server URL is 'https://10.0.2.15:8443'
       The user authentication is 'system:admin/10-0-2-15:8443'
       The current project is 'default'
       Successfully requested project list; has access to project(s):
         [default kube-public kube-system openshift openshift-infra openshift-node]

[Note] Running diagnostic: DiagnosticPod
       Description: Create a pod to run diagnostics from the application standpoint

WARN:  [DCli2013 from diagnostic DiagnosticPod@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/pod/run_diagnostics_pod.go:196]
       See the warnings below in the output from the diagnostic pod:
       [Note] Running diagnostic: PodCheckAuth
              Description: Check that service account credentials authenticate as expected

       Info:  Service account token successfully authenticated to master
       WARN:  [DP1007 from diagnostic PodCheckAuth@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/pod/in_pod/auth.go:115]
              DNS resolution for registry address docker-registry.default.svc.cluster.local returned no results; either the integrated registry is not deployed, or container DNS co
nfiguration is incorrect.

       [Note] Running diagnostic: PodCheckDns
              Description: Check that DNS within a pod works as expected

       [Note] Summary of diagnostics execution (version v3.10.0+e3465d0-44):
       [Note] Warnings seen: 1

[Note] Skipping diagnostic: AggregatedLogging
       Description: Check aggregated logging integration for proper configuration
       Because: Logging project does not exist

[Note] Running diagnostic: AppCreate
       Description: Create an application and test that it deploys correctly.

I0914 09:06:51.719439    3572 logs.go:49] Unsolicited response received on idle HTTP channel starting with "HTTP/1.0 200 OK\r\nContent-Type: text/plain\r\n\r\nHello\r\n"; err=<nil>

Info:  09:06:48.034: Using project 'openshift-diagnostic-appcreate-gq27f' for diagnostic.
Info:  09:06:49.845: App 'diagnostic-appcreate' is running
Info:  09:06:51.217: Request to service address http://172.30.122.179:8080/ succeeded

ERROR: [DCluAC028 from diagnostic AppCreate@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/app_create/route.go:97]
       09:07:01.225: Route was not admitted by a router before timeout (10 sec)
       Diagnostics waited for the 'diagnostic-appcreate' route to be admitted by a router (making the
       application available via that route) after the test app started running.
       However, this did not occur within the timeout.
       Some of the reasons why this may fail include:
         * There is no router running to accept routes
         * The available router(s) are configured not to accept the route
         * The router simply needs longer to admit the route (you can increase the timeout)
         * The app stopped responding or was killed

Info:  App creation and readiness completed with success=true in 1.61385957s
Info:  Service creation and testing completed with success=true in 1.371270717s
Info:  Route creation and testing completed with success=false in 10.007870088s
Info:  Entire create/test completed with success=false in 13.191046324s

[Note] Running diagnostic: ClusterRegistry
       Description: Check that there is a working Docker registry

WARN:  [DClu1002 from diagnostic ClusterRegistry@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/registry.go:194]
       There is no "docker-registry" service in project "default". This is not strictly required to
       be present; however, it is required for builds, and its absence probably
       indicates an incomplete installation.

       Please consult the documentation and use the 'oc adm registry' command
       to create a Docker registry.

[Note] Running diagnostic: ClusterRoleBindings
       Description: Check that the default ClusterRoleBindings are present and contain the expected subjects

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected.

       Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects.

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount  horizontal-pod-autoscaler openshift-infra}.

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected.

       Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects.

Info:  clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount  horizontal-pod-autoscaler kube-system}.

[Note] Running diagnostic: ClusterRoles
       Description: Check that the default ClusterRoles are present and contain the expected permissions

Info:  clusterrole/admin has changed, but the existing role has more permissions than the new role.

       If you can confirm that the extra permissions are not required, you may use the
       'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
       For example,

         $ oc adm policy reconcile-cluster-roles \
                --additive-only=false --confirm

Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["impersonate"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["localsubjectaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["localresourceaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["localsubjectaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["subjectrulesreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["localresourceaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["localsubjectaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["subjectrulesreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["podsecuritypolicyreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["podsecuritypolicyselfsubjectreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["podsecuritypolicysubjectreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["security.openshift.io"], Resources:["podsecuritypolicyreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["security.openshift.io"], Resources:["podsecuritypolicyselfsubjectreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["security.openshift.io"], Resources:["podsecuritypolicysubjectreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindingrestrictions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindingrestrictions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindingrestrictions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/clone"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/clone"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/details"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/details"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["admin"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["edit"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["view"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimports"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimports"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/custom-host"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/custom-host"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["delete"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["patch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["update"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["list"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["watch"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourceaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["subjectaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["resourceaccessreviews"], Verbs:["create"]}.
Info:  clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["subjectaccessreviews"], Verbs:["create"]}.

Info:  clusterrole/edit has changed, but the existing role has more permissions than the new role.

       If you can confirm that the extra permissions are not required, you may use the
       'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
       For example,

         $ oc adm policy reconcile-cluster-roles \
                --additive-only=false --confirm

Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["impersonate"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/clone"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/clone"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/details"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/details"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["edit"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["view"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimports"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimports"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/custom-host"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/custom-host"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["create"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["delete"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["patch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["update"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["watch"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["list"]}.
Info:  clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["watch"]}.

Info:  clusterrole/view has changed, but the existing role has more permissions than the new role.

       If you can confirm that the extra permissions are not required, you may use the
       'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
       For example,

         $ oc adm policy reconcile-cluster-roles \
                --additive-only=false --confirm

Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["view"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["watch"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["list"]}.
Info:  clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["watch"]}.

[Note] Running diagnostic: ClusterRouter
       Description: Check there is a working router

WARN:  [DClu2001 from diagnostic ClusterRouter@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/router.go:135]
       There is no "router" DeploymentConfig. The router may have been named
       something different, in which case this warning may be ignored.

       A router is not strictly required; however it is needed for accessing
       pods from external networks and its absence likely indicates an incomplete
       installation of the cluster.

       Use the 'oc adm router' command to create a router.

[Note] Running diagnostic: MasterNode
       Description: Check if master is also running node (for Open vSwitch)

Info:  Found a node with same IP as master: c1-ocp

[Note] Skipping diagnostic: MetricsApiProxy
       Description: Check the integrated heapster metrics can be reached via the API proxy
       Because: The heapster service does not exist in the openshift-infra project at this time,
       so it is not available for the Horizontal Pod Autoscaler to use as a source of metrics.

[Note] Running diagnostic: NetworkCheck
       Description: Create a pod on all schedulable nodes and run network diagnostics from the application standpoint

Info:  Skipping network diagnostics check. Reason: Not using openshift network plugin.

[Note] Running diagnostic: NodeDefinitions
       Description: Check node records on master

[Note] Running diagnostic: RouteCertificateValidation
       Description: Check all route certificates for certificates that might be rejected by extended validation.

[Note] Skipping diagnostic: ServiceExternalIPs
       Description: Check for existing services with ExternalIPs that are disallowed by master config
       Because: No master config file was detected

[Note] Summary of diagnostics execution (version v3.10.0+dd10d17):
[Note] Warnings seen: 3
[Note] Errors seen: 1

lifecyclrotten simaster siuser-interface

Most helpful comment

@spadgett Thanks for updates, Yes i will try to use recommended approach but i want to know reason why websonsole was not working?

As per my understanding binary installation doesn't deploy webconsole so i did following step to install it, Please correct me if my understanding is wrong

Following are steps to install websonsole (Confirm if this is correct way)

  • Clone the openshift origin repo
    git clone https://github.com/openshift/origin.git

  • Update the origin/install/origin-web-console/console-config.yaml file , with correct IP details.

  • Execute following steps

$ oc login -u system:admin
$ oc create namespace openshift-web-console
$ oc process -f origin/install/origin-web-console/console-template.yaml -p
"API_SERVER_CONFIG=$(cat origin/install/origin-web-console/console-config.yaml)" | oc
apply -n openshift-web-console -f -

Now you can access web console at https://:8443/console

All 8 comments

@openshift/sig-user-interface

Install OKD "All-in-One Server" using below links
https://docs.okd.io/latest/getting_started/administrators.html#downloading-the-binary

@openshift/sig-master Is this method of running OpenShift still supported?

@imranrazakhan I'd recommend using oc cluster up or running an Ansible install, which will set up the web console for you.

@spadgett Thanks for updates, Yes i will try to use recommended approach but i want to know reason why websonsole was not working?

As per my understanding binary installation doesn't deploy webconsole so i did following step to install it, Please correct me if my understanding is wrong

Following are steps to install websonsole (Confirm if this is correct way)

  • Clone the openshift origin repo
    git clone https://github.com/openshift/origin.git

  • Update the origin/install/origin-web-console/console-config.yaml file , with correct IP details.

  • Execute following steps

$ oc login -u system:admin
$ oc create namespace openshift-web-console
$ oc process -f origin/install/origin-web-console/console-template.yaml -p
"API_SERVER_CONFIG=$(cat origin/install/origin-web-console/console-config.yaml)" | oc
apply -n openshift-web-console -f -

Now you can access web console at https://:8443/console

Yes i will try to use recommended approach but i want to know reason why websonsole was not working?

Simply that openshift start doesn't do anything to install the console. (It seems the docs are out of date.)

What you've done looks right.

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten
/remove-lifecycle stale

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

@openshift-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Was this page helpful?
0 / 5 - 0 ratings