Skip to content

Instantly share code, notes, and snippets.

@pweil-
Created October 9, 2018 18:21
Show Gist options
  • Save pweil-/e42f60e6993db7175236330d5003940d to your computer and use it in GitHub Desktop.
Save pweil-/e42f60e6993db7175236330d5003940d to your computer and use it in GitHub Desktop.
Error from server (Forbidden): clusterrolebindings.authorization.openshift.io "dedicated-project-admin-0" is forbidden: attempt to grant extra privileges: [
PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["create"]}
PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["delete"]}
PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["get"]}
PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["list"]}
PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["patch"]}
PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["update"]}
PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["watch"]}
PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["create"]}
PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["delete"]}
PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["get"]}
PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["list"]}
PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["patch"]}
PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["update"]}
PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["watch"]}
PolicyRule{APIGroups:[""], Resources:["egressnetworkpolicies"], Verbs:["create"]}
PolicyRule{APIGroups:[""], Resources:["egressnetworkpolicies"], Verbs:["delete"]}
PolicyRule{APIGroups:[""], Resources:["egressnetworkpolicies"], Verbs:["get"]}
PolicyRule{APIGroups:[""], Resources:["egressnetworkpolicies"], Verbs:["list"]}
PolicyRule{APIGroups:[""], Resources:["egressnetworkpolicies"], Verbs:["patch"]}
PolicyRule{APIGroups:[""], Resources:["egressnetworkpolicies"], Verbs:["update"]}
PolicyRule{APIGroups:[""], Resources:["egressnetworkpolicies"], Verbs:["watch"]}
PolicyRule{APIGroups:["network.openshift.io"], Resources:["egressnetworkpolicies"], Verbs:["create"]}
PolicyRule{APIGroups:["network.openshift.io"], Resources:["egressnetworkpolicies"], Verbs:["delete"]}
PolicyRule{APIGroups:["network.openshift.io"], Resources:["egressnetworkpolicies"], Verbs:["get"]}
PolicyRule{APIGroups:["network.openshift.io"], Resources:["egressnetworkpolicies"], Verbs:["list"]}
PolicyRule{APIGroups:["network.openshift.io"], Resources:["egressnetworkpolicies"], Verbs:["patch"]}
PolicyRule{APIGroups:["network.openshift.io"], Resources:["egressnetworkpolicies"], Verbs:["update"]}
PolicyRule{APIGroups:["network.openshift.io"], Resources:["egressnetworkpolicies"], Verbs:["watch"]}
PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["create"]}
PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["delete"]}
PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["get"]}
PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["list"]}
PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["patch"]}
PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["update"]}
PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["watch"]}]
ownerrules=[
PolicyRule{APIGroups:["" "user.openshift.io"], Resources:["users"], ResourceNames:["~"], Verbs:["get"]}
PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projectrequests"], Verbs:["list"]}
PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["clusterroles"], Verbs:["get" "list"]}
PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["clusterroles"], Verbs:["get" "list" "watch"]}
PolicyRule{APIGroups:["storage.k8s.io"], Resources:["storageclasses"], Verbs:["get" "list"]}
PolicyRule{APIGroups:["" "project.openshift.io"], Resources:["projects"], Verbs:["list" "watch"]}
PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["selfsubjectrulesreviews"], Verbs:["create"]}
PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews"], Verbs:["create"]}
PolicyRule{NonResourceURLs:["/healthz" "/healthz/*"], Verbs:["get"]}
PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]}
PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["rolebindings" "clusterrolebindings"], Verbs:["create" "delete" "get" "list" "patch" "update" "watch"]}
PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings" "clusterrolebindings"], Verbs:["create" "delete" "get" "list" "patch" "update" "watch"]}
PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["clusterrolebindings"], Verbs:["get" "list" "watch"]}
PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["clusterrolebindings"], ResourceNames:["dedicated-project-admin-0"], Verbs:["create"]}
PolicyRule{APIGroups:["" "authorization.openshift.io"], Resources:["selfsubjectrulesreviews"], Verbs:["create"]}
PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews"], Verbs:["create"]}
PolicyRule{APIGroups:["servicecatalog.k8s.io"], Resources:["clusterserviceclasses" "clusterserviceplans"], Verbs:["list" "watch" "get"]}
PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["selfsubjectaccessreviews" "selfsubjectrulesreviews"], Verbs:["create"]}
PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/docker" "builds/optimizeddocker"], Verbs:["create"]}
PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/jenkinspipeline"], Verbs:["create"]}
PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["builds/source"], Verbs:["create"]}
PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]}
PolicyRule{NonResourceURLs:["/version" "/version/*" "/api" "/api/*" "/apis" "/apis/*" "/oapi" "/oapi/*" "/openapi/v2" "/swaggerapi" "/swaggerapi/*" "/swagger.json" "/swagger-2.0.0.pb-v1" "/osapi" "/osapi/" "/.well-known" "/.well-known/*" "/"], Verbs:["get"]}
PolicyRule{APIGroups:["" "oauth.openshift.io"], Resources:["oauthaccesstokens" "oauthauthorizetokens"], Verbs:["delete"]}
PolicyRule{APIGroups:["authentication.k8s.io"], Resources:["userextras/scopes.authorization.openshift.io"], Verbs:["impersonate"]}
PolicyRule{APIGroups:["" "build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["create" "get"]}]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment