Skip to content

Commit aa4b227

Browse files
committed
ADD TCX5 Waiver
1 parent 3e428d6 commit aa4b227

40 files changed

+108
-100
lines changed

latest/ug/attributes.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
:tcx5-waiver: pass:[ ]
2+
13
// eksctl version
24
:eksctl-min-version: 0.214.0
35

latest/ug/automode/auto-controls.adoc

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,10 @@ The SCP below prevents calling `ec2:RunInstances` unless the AMI belongs to the
2020
It's important *not* to use the `ec2:Owner` context key. Amazon owns the EKS Auto Mode AMI accounts and the value for this key will always be `amazon`. Constructing an SCP that allows launching AMIs if the `ec2:Owner` is `amazon` will allow launching any Amazon owned AMI, not just those for EKS Auto Mode.*
2121
====
2222

23-
```json
23+
[source,json,subs="verbatim,attributes"]
24+
----
2425
{
25-
"Version": "2012-10-17",
26+
"Version": "2012-10-17",{tcx5-waiver}
2627
"Statement": [
2728
{
2829
"Sid": "DenyAMI",
@@ -40,7 +41,7 @@ It's important *not* to use the `ec2:Owner` context key. Amazon owns the EKS Aut
4041
}
4142
]
4243
}
43-
```
44+
----
4445

4546
== EKS Auto Mode AMI accounts
4647

latest/ug/automode/auto-enable-existing.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ The Cluster IAM role of an EKS Cluster cannot be changed after the cluster is cr
4040
. From the *Trust relationships* tab, select *Edit trust policy*
4141
. Insert the following Cluster IAM Role trust policy, and select *Update policy*
4242

43-
[source,json]
43+
[source,json,subs="verbatim,attributes"]
4444
----
4545
{
46-
"Version": "2012-10-17",
46+
"Version": "2012-10-17",{tcx5-waiver}
4747
"Statement": [
4848
{
4949
"Effect": "Allow",

latest/ug/automode/auto-kms.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This policy only includes permissions for EKS Auto Mode. The key policy may need
4242
[source,json,subs="verbatim,attributes"]
4343
----
4444
{
45-
"Version": "2012-10-17",
45+
"Version": "2012-10-17",{tcx5-waiver}
4646
"Id": "MyKeyPolicy",
4747
"Statement": [
4848
{

latest/ug/automode/auto-learn-iam.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ By default, the managed policies related to EKS Auto Mode do not permit applying
8686
[source,json,subs="verbatim,attributes"]
8787
----
8888
{
89-
"Version": "2012-10-17",
89+
"Version": "2012-10-17",{tcx5-waiver}
9090
"Statement": [
9191
{
9292
"Sid": "Compute",

latest/ug/automode/automode-get-started-cli.adoc

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -92,9 +92,10 @@ EKS Auto Mode also requires a Service-Linked Role, which is automatically create
9292

9393
Create a trust policy that allows the Amazon EKS service to assume the role. Save the policy as `trust-policy.json`:
9494

95-
```
95+
[source,json,subs="verbatim,attributes"]
96+
----
9697
{
97-
"Version": "2012-10-17",
98+
"Version": "2012-10-17",{tcx5-waiver}
9899
"Statement": [
99100
{
100101
"Effect": "Allow",
@@ -108,7 +109,7 @@ Create a trust policy that allows the Amazon EKS service to assume the role. Sav
108109
}
109110
]
110111
}
111-
```
112+
----
112113

113114
=== Step 2: Create the IAM Role
114115

@@ -183,9 +184,10 @@ aws iam attach-role-policy \
183184

184185
Create a trust policy that allows the Amazon EKS service to assume the role. Save the policy as `node-trust-policy.json`:
185186

186-
```
187+
[source,json,subs="verbatim,attributes"]
188+
----
187189
{
188-
"Version": "2012-10-17",
190+
"Version": "2012-10-17",{tcx5-waiver}
189191
"Statement": [
190192
{
191193
"Effect": "Allow",
@@ -196,7 +198,8 @@ Create a trust policy that allows the Amazon EKS service to assume the role. Sav
196198
}
197199
]
198200
}
199-
```
201+
----[source,json,subs="verbatim,attributes"]
202+
----
200203

201204
==== Step 2: Create the Node IAM Role
202205

latest/ug/automode/create-storage-class.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Update the following values in the policy below:
7272
[source,json,subs="verbatim,attributes"]
7373
----
7474
{
75-
"Version": "2012-10-17",
75+
"Version": "2012-10-17",{tcx5-waiver}
7676
"Id": "key-auto-policy-3",
7777
"Statement": [
7878
{

latest/ug/clusters/create-cluster-auto.adoc

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -126,9 +126,10 @@ The following CLI instructions cover creating IAM resources and creating the clu
126126

127127
Create a trust policy that allows the Amazon EKS service to assume the role. Save the policy as `trust-policy.json`:
128128

129-
```
129+
[source,json,subs="verbatim,attributes"]
130+
----
130131
{
131-
"Version": "2012-10-17",
132+
"Version": "2012-10-17",{tcx5-waiver}
132133
"Statement": [
133134
{
134135
"Effect": "Allow",
@@ -142,7 +143,7 @@ Create a trust policy that allows the Amazon EKS service to assume the role. Sav
142143
}
143144
]
144145
}
145-
```
146+
----
146147

147148
==== Step 2: Create the IAM Role
148149

@@ -217,9 +218,10 @@ aws iam attach-role-policy \
217218

218219
Create a trust policy that allows the Amazon EKS service to assume the role. Save the policy as `node-trust-policy.json`:
219220

220-
```
221+
[source,json,subs="verbatim,attributes"]
222+
----
221223
{
222-
"Version": "2012-10-17",
224+
"Version": "2012-10-17",{tcx5-waiver}
223225
"Statement": [
224226
{
225227
"Effect": "Allow",
@@ -230,7 +232,7 @@ Create a trust policy that allows the Amazon EKS service to assume the role. Sav
230232
}
231233
]
232234
}
233-
```
235+
----
234236

235237
==== Step 2: Create the Node IAM Role
236238

latest/ug/clusters/create-cluster.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This topic provides an overview of the available options and describes what to c
3939
----
4040
cat >eks-cluster-role-trust-policy.json <<EOF
4141
{
42-
"Version": "2012-10-17",
42+
"Version": "2012-10-17",{tcx5-waiver}
4343
"Statement": [
4444
{
4545
"Effect": "Allow",

latest/ug/getting-started/getting-started-console.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ TIP: For a list of all the resources the previous command creates, open the {aws
7070
[source,json,subs="verbatim,attributes"]
7171
----
7272
{
73-
"Version": "2012-10-17",
73+
"Version": "2012-10-17",{tcx5-waiver}
7474
"Statement": [
7575
{
7676
"Effect": "Allow",
@@ -184,7 +184,7 @@ To learn more about different ways to configure nodes in EKS, see <<eks-compute>
184184
[source,json,subs="verbatim,attributes"]
185185
----
186186
{
187-
"Version": "2012-10-17",
187+
"Version": "2012-10-17",{tcx5-waiver}
188188
"Statement": [
189189
{
190190
"Effect": "Allow",

0 commit comments

Comments
 (0)