@@ -37,7 +37,7 @@ NOTE: The list only contains roles that have the following trust policy which al
3737[source,json,subs="verbatim,attributes"]
3838----
3939{
40- "Version": "2012-10-17",&TCX5-2025-waiver; {tcx5-waiver}
40+ "Version": "2012-10-17",{tcx5-waiver}
4141 "Statement": [
4242 {
4343 "Sid": "AllowEksAuthToAssumeRoleForPodIdentity",
@@ -82,7 +82,7 @@ You can run the following command to create an example policy file that allows r
8282----
8383cat >my-policy.json <<EOF
8484{
85- "Version": "2012-10-17",&TCX5-2025-waiver; {tcx5-waiver}
85+ "Version": "2012-10-17",{tcx5-waiver}
8686 "Statement": [
8787 {
8888 "Effect": "Allow",
@@ -129,7 +129,7 @@ kubectl apply -f my-service-account.yaml
129129----
130130cat >trust-relationship.json <<EOF
131131{
132- "Version": "2012-10-17",&TCX5-2025-waiver; {tcx5-waiver}
132+ "Version": "2012-10-17",{tcx5-waiver}
133133 "Statement": [
134134 {
135135 "Sid": "AllowEksAuthToAssumeRoleForPodIdentity",
@@ -203,7 +203,7 @@ An example output is as follows.
203203[source,json,subs="verbatim,attributes",role="nocopy"]
204204----
205205{
206- "Version": "2012-10-17",&TCX5-2025-waiver; {tcx5-waiver}
206+ "Version": "2012-10-17",{tcx5-waiver}
207207 "Statement": [
208208 {
209209 "Sid": "Allow EKS Auth service to assume this role for Pod Identities",
@@ -272,7 +272,7 @@ An example output is as follows.
272272[source,json,subs="verbatim,attributes",role="nocopy"]
273273----
274274{
275- "Version": "2012-10-17",&TCX5-2025-waiver; {tcx5-waiver}
275+ "Version": "2012-10-17",{tcx5-waiver}
276276 "Statement": [
277277 {
278278 "Effect": "Allow",
0 commit comments