awscli 1.41.6__py3-none-any.whl → 1.41.8__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (28) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/customizations/removals.py +2 -0
  3. awscli/examples/eks/associate-access-policy.rst +29 -0
  4. awscli/examples/eks/create-access-entry.rst +54 -0
  5. awscli/examples/eks/create-pod-identity-association.rst +59 -0
  6. awscli/examples/eks/delete-access-entry.rst +11 -0
  7. awscli/examples/eks/delete-pod-identity-association.rst +28 -0
  8. awscli/examples/eks/describe-access-entry.rst +25 -0
  9. awscli/examples/eks/describe-insight.rst +36 -0
  10. awscli/examples/eks/describe-pod-identity-association.rst +28 -0
  11. awscli/examples/eks/disassociate-access-policy.rst +12 -0
  12. awscli/examples/eks/list-access-entries.rst +19 -0
  13. awscli/examples/eks/list-access-policies.rst +90 -0
  14. awscli/examples/eks/list-associated-access-policies.rst +27 -0
  15. awscli/examples/eks/list-insights.rst +67 -0
  16. awscli/examples/eks/list-pod-identity-associations.rst +61 -0
  17. awscli/examples/eks/update-access-entry.rst +28 -0
  18. awscli/examples/eks/update-pod-identity-association.rst +29 -0
  19. {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/METADATA +2 -2
  20. {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/RECORD +28 -12
  21. {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws +0 -0
  22. {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws.cmd +0 -0
  23. {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws_bash_completer +0 -0
  24. {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws_completer +0 -0
  25. {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws_zsh_completer.sh +0 -0
  26. {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/LICENSE.txt +0 -0
  27. {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/WHEEL +0 -0
  28. {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/top_level.txt +0 -0
awscli/__init__.py CHANGED
@@ -18,7 +18,7 @@ A Universal Command Line Environment for Amazon Web Services.
18
18
 
19
19
  import os
20
20
 
21
- __version__ = '1.41.6'
21
+ __version__ = '1.41.8'
22
22
 
23
23
  #
24
24
  # Get our data path to be added to botocore's search path
@@ -60,6 +60,8 @@ def register_removals(event_handler):
60
60
  'invoke-inline-agent',
61
61
  'optimize-prompt',
62
62
  'retrieve-and-generate-stream'])
63
+ cmd_remover.remove(on_event='building-command-table.bedrock-agentcore',
64
+ remove_commands=['invoke-code-interpreter'])
63
65
  cmd_remover.remove(on_event='building-command-table.qbusiness',
64
66
  remove_commands=['chat'])
65
67
  cmd_remover.remove(on_event='building-command-table.iotsitewise',
@@ -0,0 +1,29 @@
1
+ **To associate an access policy and its scope to the access entry of the cluster**
2
+
3
+ The following ``associate-access-policy`` associates an access policy and its scope to the access entry of the specified cluster. ::
4
+
5
+ aws eks associate-access-policy \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin \
8
+ --policy-arn arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy \
9
+ --access-scope type=namespace,namespaces=default
10
+
11
+ Output::
12
+
13
+ {
14
+ "clusterName": "eks-customer",
15
+ "principalArn": "arn:aws:iam::111122223333:role/Admin",
16
+ "associatedAccessPolicy": {
17
+ "policyArn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy",
18
+ "accessScope": {
19
+ "type": "namespace",
20
+ "namespaces": [
21
+ "default"
22
+ ]
23
+ },
24
+ "associatedAt": "2025-05-24T15:59:51.981000-05:00",
25
+ "modifiedAt": "2025-05-24T15:59:51.981000-05:00"
26
+ }
27
+ }
28
+
29
+ For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,54 @@
1
+ **Example 1: To create the access entry for EKS cluster**
2
+
3
+ The following ``create-access-entry`` example creates an access entry that allows an IAM principal to access the EKS cluster. ::
4
+
5
+ aws eks create-access-entry \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:user/eks-user
8
+
9
+ Output::
10
+
11
+ {
12
+ "accessEntry": {
13
+ "clusterName": "eks-customer",
14
+ "principalArn": "arn:aws:iam::111122223333:user/eks-user",
15
+ "kubernetesGroups": [],
16
+ "accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/user/111122223333/eks-user/a1b2c3d4-5678-90ab-cdef-a6506e3d36p0",
17
+ "createdAt": "2025-04-14T22:45:48.097000-05:00",
18
+ "modifiedAt": "2025-04-14T22:45:48.097000-05:00",
19
+ "tags": {},
20
+ "username": "arn:aws:iam::111122223333:user/eks-user",
21
+ "type": "STANDARD"
22
+ }
23
+ }
24
+
25
+ For more information, see `Create access entries <https://docs.aws.amazon.com/eks/latest/userguide/creating-access-entries.html>`__ in the *Amazon EKS User Guide*.
26
+
27
+ **Example 2: To create the access entry for EKS cluster by specifying the type of access entry**
28
+
29
+ The following ``create-access-entry`` example creates an access entry of type ``EC2_LINUX`` in the EKS cluster. By default, a type ``STANDARD`` access entry is created. Apart from the default, if we specify any other access entry types, an IAM role ARN needs to be passed in the CLI. ::
30
+
31
+ aws eks create-access-entry \
32
+ --cluster-name eks-customer \
33
+ --principal-arn arn:aws:iam::111122223333:role/admin-test-ip \
34
+ --type EC2_LINUX
35
+
36
+ Output::
37
+
38
+ {
39
+ "accessEntry": {
40
+ "clusterName": "eks-customer",
41
+ "principalArn": "arn:aws:iam::111122223333:role/admin-test-ip",
42
+ "kubernetesGroups": [
43
+ "system:nodes"
44
+ ],
45
+ "accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/role/111122223333/admin-test-ip/accb5418-f493-f390-3e6e-c3f19f725fcp",
46
+ "createdAt": "2025-05-06T19:42:45.453000-05:00",
47
+ "modifiedAt": "2025-05-06T19:42:45.453000-05:00",
48
+ "tags": {},
49
+ "username": "system:node:{{EC2PrivateDNSName}}",
50
+ "type": "EC2_LINUX"
51
+ }
52
+ }
53
+
54
+ For more information, see `Create access entries <https://docs.aws.amazon.com/eks/latest/userguide/creating-access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,59 @@
1
+ **Example 1: To create an EKS Pod Identity association in EKS cluster**
2
+
3
+ The following ``create-pod-identity-association`` example creates an EKS Pod Identity association between a service account in the EKS cluster and an IAM role. ::
4
+
5
+ aws eks create-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --namespace default \
8
+ --service-account default \
9
+ --role-arn arn:aws:iam::111122223333:role/my-role
10
+
11
+ Output::
12
+
13
+ {
14
+ "association": {
15
+ "clusterName": "eks-customer",
16
+ "namespace": "default",
17
+ "serviceAccount": "default",
18
+ "roleArn": "arn:aws:iam::111122223333:role/my-role",
19
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-8mvwvh57cu74mgcst",
20
+ "associationId": "a-8mvwvh57cu74mgcst",
21
+ "tags": {},
22
+ "createdAt": "2025-05-24T19:40:13.961000-05:00",
23
+ "modifiedAt": "2025-05-24T19:40:13.961000-05:00"
24
+ }
25
+ }
26
+
27
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
28
+
29
+ **Example 2: To create an EKS Pod Identity association in EKS cluster with tags**
30
+
31
+ The following ``create-pod-identity-association`` creates an EKS Pod Identity association between a service account and an IAM role in the EKS cluster with tags. ::
32
+
33
+ aws eks create-pod-identity-association \
34
+ --cluster-name eks-customer \
35
+ --namespace default \
36
+ --service-account default \
37
+ --role-arn arn:aws:iam::111122223333:role/my-role \
38
+ --tags Key1=value1,Key2=value2
39
+
40
+ Output::
41
+
42
+ {
43
+ "association": {
44
+ "clusterName": "eks-customer",
45
+ "namespace": "default",
46
+ "serviceAccount": "default",
47
+ "roleArn": "arn:aws:iam::111122223333:role/my-role",
48
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgoda",
49
+ "associationId": "a-9njjin9gfghecgoda",
50
+ "tags": {
51
+ "Key2": "value2",
52
+ "Key1": "value1"
53
+ },
54
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
55
+ "modifiedAt": "2025-05-24T19:52:14.135000-05:00"
56
+ }
57
+ }
58
+
59
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,11 @@
1
+ **To delete an access entry associated with the cluster**
2
+
3
+ The following ``delete-access-entry`` deletes an access entry associated with the EKS cluster named ``eks-customer``. ::
4
+
5
+ aws eks delete-access-entry \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Delete access entries <https://docs.aws.amazon.com/eks/latest/userguide/deleting-access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,28 @@
1
+ **To delete the EKS Pod Identity association**
2
+
3
+ The following ``delete-pod-identity-association`` example deletes the EKS Pod Identity association with association ID ``a-9njjin9gfghecgocd`` from the EKS cluster named ``eks-customer``. ::
4
+
5
+ aws eks delete-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --association-id a-9njjin9gfghecgocd
8
+
9
+ Output::
10
+
11
+ {
12
+ "association": {
13
+ "clusterName": "eks-customer",
14
+ "namespace": "default",
15
+ "serviceAccount": "default",
16
+ "roleArn": "arn:aws:iam::111122223333:role/s3-role",
17
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
18
+ "associationId": "a-9njjin9gfghecgocd",
19
+ "tags": {
20
+ "Key2": "value2",
21
+ "Key1": "value1"
22
+ },
23
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
24
+ "modifiedAt": "2025-05-25T21:10:56.923000-05:00"
25
+ }
26
+ }
27
+
28
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,25 @@
1
+ **To describe the access entry for EKS cluster**
2
+
3
+ The following ``describe-access-entry`` example describes an access entry for the EKS cluster. ::
4
+
5
+ aws eks describe-access-entry \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:user/eks-admin-user
8
+
9
+ Output::
10
+
11
+ {
12
+ "accessEntry": {
13
+ "clusterName": "eks-customer",
14
+ "principalArn": "arn:aws:iam::111122223333:user/eks-admin-user",
15
+ "kubernetesGroups": [],
16
+ "accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/user/111122223333/eks-admin-user/0acb1bc6-cb0a-ede6-11ae-a6506e3d36p0",
17
+ "createdAt": "2025-04-14T22:45:48.097000-05:00",
18
+ "modifiedAt": "2025-04-14T22:45:48.097000-05:00",
19
+ "tags": {},
20
+ "username": "arn:aws:iam::111122223333:user/eks-admin-user",
21
+ "type": "STANDARD"
22
+ }
23
+ }
24
+
25
+ For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,36 @@
1
+ **To get the details of an insight for an EKS cluster using its ID**
2
+
3
+ The following ``describe-insight`` example returns the details about the insight specified using the cluster name and insight ID. ::
4
+
5
+ aws eks describe-insight \
6
+ --cluster-name eks-customer \
7
+ --id 38ea7a64-a14f-4e0e-95c7-8dbcab3c3623
8
+
9
+ Output::
10
+
11
+ {
12
+ "insight": {
13
+ "id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3623",
14
+ "name": "Kubelet version skew",
15
+ "category": "UPGRADE_READINESS",
16
+ "kubernetesVersion": "1.33",
17
+ "lastRefreshTime": "2025-05-24T11:22:50-05:00",
18
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
19
+ "description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
20
+ "insightStatus": {
21
+ "status": "PASSING",
22
+ "reason": "Node kubelet versions match the cluster control plane version."
23
+ },
24
+ "recommendation": "Upgrade your worker nodes to match the Kubernetes version of your cluster control plane.",
25
+ "additionalInfo": {
26
+ "Kubelet version skew policy": "https://kubernetes.io/releases/version-skew-policy/#kubelet",
27
+ "Updating a managed node group": "https://docs.aws.amazon.com/eks/latest/userguide/update-managed-node-group.html"
28
+ },
29
+ "resources": [],
30
+ "categorySpecificSummary": {
31
+ "deprecationDetails": []
32
+ }
33
+ }
34
+ }
35
+
36
+ For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,28 @@
1
+ **To provide the details about Pod Identity association**
2
+
3
+ The following ``describe-pod-identity-association`` example describes a Pod Identity association in the EKS cluster. ::
4
+
5
+ aws eks describe-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --association-id a-9njjin9gfghecgocd
8
+
9
+ Output::
10
+
11
+ {
12
+ "association": {
13
+ "clusterName": "eks-customer",
14
+ "namespace": "default",
15
+ "serviceAccount": "default",
16
+ "roleArn": "arn:aws:iam::111122223333:role/my-role",
17
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
18
+ "associationId": "a-9njjin9gfghecgocd",
19
+ "tags": {
20
+ "Key2": "value2",
21
+ "Key1": "value1"
22
+ },
23
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
24
+ "modifiedAt": "2025-05-24T19:52:14.135000-05:00"
25
+ }
26
+ }
27
+
28
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,12 @@
1
+ **To disassociate the access policy from an access entry**
2
+
3
+ The following ``disassociate-access-policy`` removes the access policy associated with the access entry. ::
4
+
5
+ aws eks disassociate-access-policy \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin \
8
+ --policy-arn arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy
9
+
10
+ This command produces no output.
11
+
12
+ For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,19 @@
1
+ **To list the access entries for an EKS cluster**
2
+
3
+ The following ``list-access-entries`` returns the list of access entries associated with the EKS cluster ``eks-customer``. ::
4
+
5
+ aws eks list-access-entries \
6
+ --cluster-name eks-customer
7
+
8
+ Output::
9
+
10
+ {
11
+ "accessEntries": [
12
+ "arn:aws:iam::111122223333:role/Admin",
13
+ "arn:aws:iam::111122223333:role/admin-test-ip",
14
+ "arn:aws:iam::111122223333:role/assume-worker-node-role",
15
+ "arn:aws:iam::111122223333:user/eks-admin-user"
16
+ ]
17
+ }
18
+
19
+ For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,90 @@
1
+ **To list all available access policies**
2
+
3
+ This ``list-access-policies`` example returns the list of all available access policies. ::
4
+
5
+ aws eks list-access-policies
6
+
7
+ Output::
8
+
9
+ {
10
+ "accessPolicies": [
11
+ {
12
+ "name": "AmazonEKSAdminPolicy",
13
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy"
14
+ },
15
+ {
16
+ "name": "AmazonEKSAdminViewPolicy",
17
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminViewPolicy"
18
+ },
19
+ {
20
+ "name": "AmazonEKSAutoNodePolicy",
21
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAutoNodePolicy"
22
+ },
23
+ {
24
+ "name": "AmazonEKSBlockStorageClusterPolicy",
25
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStorageClusterPolicy"
26
+ },
27
+ {
28
+ "name": "AmazonEKSBlockStoragePolicy",
29
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStoragePolicy"
30
+ },
31
+ {
32
+ "name": "AmazonEKSClusterAdminPolicy",
33
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
34
+ },
35
+ {
36
+ "name": "AmazonEKSComputeClusterPolicy",
37
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputeClusterPolicy"
38
+ },
39
+ {
40
+ "name": "AmazonEKSComputePolicy",
41
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputePolicy"
42
+ },
43
+ {
44
+ "name": "AmazonEKSEditPolicy",
45
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy"
46
+ },
47
+ {
48
+ "name": "AmazonEKSHybridPolicy",
49
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSHybridPolicy"
50
+ },
51
+ {
52
+ "name": "AmazonEKSLoadBalancingClusterPolicy",
53
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingClusterPolicy"
54
+ },
55
+ {
56
+ "name": "AmazonEKSLoadBalancingPolicy",
57
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingPolicy"
58
+ },
59
+ {
60
+ "name": "AmazonEKSNetworkingClusterPolicy",
61
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingClusterPolicy"
62
+ },
63
+ {
64
+ "name": "AmazonEKSNetworkingPolicy",
65
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingPolicy"
66
+ },
67
+ {
68
+ "name": "AmazonEKSViewPolicy",
69
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"
70
+ },
71
+ {
72
+ "name": "AmazonEMRJobPolicy",
73
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEMRJobPolicy"
74
+ },
75
+ {
76
+ "name": "AmazonSagemakerHyperpodClusterPolicy",
77
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodClusterPolicy"
78
+ },
79
+ {
80
+ "name": "AmazonSagemakerHyperpodControllerPolicy",
81
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodControllerPolicy"
82
+ },
83
+ {
84
+ "name": "AmazonSagemakerHyperpodSystemNamespacePolicy",
85
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodSystemNamespacePolicy"
86
+ }
87
+ ]
88
+ }
89
+
90
+ For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,27 @@
1
+ **To list the access policies associated with an access entry**
2
+
3
+ The following ``list-associated-access-policies`` example returns the list of access policies associated with an access entry in the EKS cluster. ::
4
+
5
+ aws eks list-associated-access-policies \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin
8
+
9
+ Output::
10
+
11
+ {
12
+ "associatedAccessPolicies": [
13
+ {
14
+ "policyArn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy",
15
+ "accessScope": {
16
+ "type": "cluster",
17
+ "namespaces": []
18
+ },
19
+ "associatedAt": "2025-05-24T17:26:22.935000-05:00",
20
+ "modifiedAt": "2025-05-24T17:26:22.935000-05:00"
21
+ }
22
+ ],
23
+ "clusterName": "eks-customer",
24
+ "principalArn": "arn:aws:iam::111122223333:role/Admin"
25
+ }
26
+
27
+ For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,67 @@
1
+ **To list all insights for the specified cluster**
2
+
3
+ The following ``list-insights`` example returns the list of all insights checked against the specified cluster. ::
4
+
5
+ aws eks list-insights \
6
+ --cluster-name eks-customer
7
+
8
+ Output::
9
+
10
+ {
11
+ "insights": [
12
+ {
13
+ "id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3616",
14
+ "name": "Kubelet version skew",
15
+ "category": "UPGRADE_READINESS",
16
+ "kubernetesVersion": "1.33",
17
+ "lastRefreshTime": "2025-05-24T11:22:50-05:00",
18
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
19
+ "description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
20
+ "insightStatus": {
21
+ "status": "PASSING",
22
+ "reason": "Node kubelet versions match the cluster control plane version."
23
+ }
24
+ },
25
+ {
26
+ "id": "9cd91472-f99c-45a9-b7d7-54d4900dee23",
27
+ "name": "EKS add-on version compatibility",
28
+ "category": "UPGRADE_READINESS",
29
+ "kubernetesVersion": "1.33",
30
+ "lastRefreshTime": "2025-05-24T11:22:59-05:00",
31
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
32
+ "description": "Checks version of installed EKS add-ons to ensure they are compatible with the next version of Kubernetes. ",
33
+ "insightStatus": {
34
+ "status": "PASSING",
35
+ "reason": "All installed EKS add-on versions are compatible with next Kubernetes version."
36
+ }
37
+ },
38
+ {
39
+ "id": "0deb269d-b1e1-458c-a2b4-7a57f940c875",
40
+ "name": "Cluster health issues",
41
+ "category": "UPGRADE_READINESS",
42
+ "kubernetesVersion": "1.33",
43
+ "lastRefreshTime": "2025-05-24T11:22:59-05:00",
44
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
45
+ "description": "Checks for any cluster health issues that prevent successful upgrade to the next Kubernetes version on EKS.",
46
+ "insightStatus": {
47
+ "status": "PASSING",
48
+ "reason": "No cluster health issues detected."
49
+ }
50
+ },
51
+ {
52
+ "id": "214fa274-344f-420b-812a-5049ce72c9ww",
53
+ "name": "kube-proxy version skew",
54
+ "category": "UPGRADE_READINESS",
55
+ "kubernetesVersion": "1.33",
56
+ "lastRefreshTime": "2025-05-24T11:22:50-05:00",
57
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
58
+ "description": "Checks version of kube-proxy in cluster to see if upgrade would cause noncompliance with supported Kubernetes kube-proxy version skew policy.",
59
+ "insightStatus": {
60
+ "status": "PASSING",
61
+ "reason": "kube-proxy versions match the cluster control plane version."
62
+ }
63
+ }
64
+ ]
65
+ }
66
+
67
+ For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,61 @@
1
+ **Example 1: To list the Pod Identity associations in an EKS cluster**
2
+
3
+ The following ``list-pod-identity-associations`` returns the list of Pod Identity associations associated with the EKS cluster named ``eks-customer`` in all namespaces and service accounts. ::
4
+
5
+ aws eks list-pod-identity-associations \
6
+ --cluster-name eks-customer
7
+
8
+ Output::
9
+
10
+ {
11
+ "associations": [
12
+ {
13
+ "clusterName": "eks-customer",
14
+ "namespace": "default",
15
+ "serviceAccount": "default",
16
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
17
+ "associationId": "a-9njjin9gfghecgocd"
18
+ },
19
+ {
20
+ "clusterName": "eks-customer",
21
+ "namespace": "kube-system",
22
+ "serviceAccount": "eks-customer",
23
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
24
+ "associationId": "a-dvtacahdvjn01ffbc"
25
+ },
26
+ {
27
+ "clusterName": "eks-customer",
28
+ "namespace": "kube-system",
29
+ "serviceAccount": "coredns",
30
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-yrpsdroc4ei7k6xps",
31
+ "associationId": "a-yrpsdroc4ei7k6xps"
32
+ }
33
+ ]
34
+ }
35
+
36
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
37
+
38
+ **Example 2: To list the Pod Identity associations in an EKS cluster based on namespace and service account**
39
+
40
+ The following ``list-pod-identity-associations`` returns the list of Pod Identity associations in the EKS cluster based on namespace and service account. ::
41
+
42
+ aws eks list-pod-identity-associations \
43
+ --cluster-name eks-customer \
44
+ --namespace kube-system \
45
+ --service-account eks-customer
46
+
47
+ Output::
48
+
49
+ {
50
+ "associations": [
51
+ {
52
+ "clusterName": "eks-customer",
53
+ "namespace": "kube-system",
54
+ "serviceAccount": "eks-customer",
55
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
56
+ "associationId": "a-dvtacahdvjn01ffbc"
57
+ }
58
+ ]
59
+ }
60
+
61
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,28 @@
1
+ **To update an access entry for an EKS cluster**
2
+
3
+ The following ``update-access-entry`` updates an access entry for the EKS cluster by adding the Kubernetes group ``tester``. ::
4
+
5
+ aws eks update-access-entry \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin \
8
+ --kubernetes-groups tester
9
+
10
+ Output::
11
+
12
+ {
13
+ "accessEntry": {
14
+ "clusterName": "eks-customer",
15
+ "principalArn": "arn:aws:iam::111122223333:role/Admin",
16
+ "kubernetesGroups": [
17
+ "tester"
18
+ ],
19
+ "accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/role/111122223333/Admin/d2cb8183-d6ec-b82a-d967-eca21902a4b4",
20
+ "createdAt": "2025-05-24T11:02:04.432000-05:00",
21
+ "modifiedAt": "2025-05-24T17:08:01.608000-05:00",
22
+ "tags": {},
23
+ "username": "arn:aws:sts::111122223333:assumed-role/Admin/{{SessionName}}",
24
+ "type": "STANDARD"
25
+ }
26
+ }
27
+
28
+ For more information, see `Update access entries <https://docs.aws.amazon.com/eks/latest/userguide/updating-access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,29 @@
1
+ **To update the EKS Pod Identity association**
2
+
3
+ The following ``update-pod-identity-association`` example updates an EKS Pod Identity association by changing the associated IAM role from ``arn:aws:iam::111122223333:role/my-role`` to ``arn:aws:iam::111122223333:role/s3-role`` for association ID ``a-9njjin9gfghecgocd``. This API only allows updating the associated IAM role. ::
4
+
5
+ aws eks update-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --association-id a-9njjin9gfghecgocd \
8
+ --role-arn arn:aws:iam::111122223333:role/s3-role
9
+
10
+ Output::
11
+
12
+ {
13
+ "association": {
14
+ "clusterName": "eks-customer",
15
+ "namespace": "default",
16
+ "serviceAccount": "default",
17
+ "roleArn": "arn:aws:iam::111122223333:role/s3-role",
18
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
19
+ "associationId": "a-9njjin9gfghecgocd",
20
+ "tags": {
21
+ "Key2": "value2",
22
+ "Key1": "value1"
23
+ },
24
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
25
+ "modifiedAt": "2025-05-25T21:01:53.120000-05:00"
26
+ }
27
+ }
28
+
29
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: awscli
3
- Version: 1.41.6
3
+ Version: 1.41.8
4
4
  Summary: Universal Command Line Environment for AWS.
5
5
  Home-page: http://aws.amazon.com/cli/
6
6
  Author: Amazon Web Services
@@ -23,7 +23,7 @@ Classifier: Programming Language :: Python :: 3.12
23
23
  Classifier: Programming Language :: Python :: 3.13
24
24
  Requires-Python: >= 3.9
25
25
  License-File: LICENSE.txt
26
- Requires-Dist: botocore (==1.39.6)
26
+ Requires-Dist: botocore (==1.39.8)
27
27
  Requires-Dist: docutils (<=0.19,>=0.18.1)
28
28
  Requires-Dist: s3transfer (<0.14.0,>=0.13.0)
29
29
  Requires-Dist: PyYAML (<6.1,>=3.10)
@@ -1,4 +1,4 @@
1
- awscli/__init__.py,sha256=5WqQmUYBDfABu9yT16d3n1D-WakXt5YLe29LT1TEk-s,1533
1
+ awscli/__init__.py,sha256=4DzhJ86VoitSY2QAwKenJP6Uuz8LoOeGcXirtxGu9DA,1533
2
2
  awscli/__main__.py,sha256=iBjOg0tBxNlhzTi_tyc1G0SMGBvHMVvBJzX3JqYaooY,662
3
3
  awscli/alias.py,sha256=Jj2jetpajUMcjqx9tFhHUOKpzLChQygnH2zqDFfmgIM,11315
4
4
  awscli/argparser.py,sha256=3Pxx-vWytdV985Y6MIl9DeutUXyehIvACIs_PDby8GI,7650
@@ -62,7 +62,7 @@ awscli/customizations/putmetricdata.py,sha256=FczJBZUGb4mXtSalD1ihwDSjMSDlxZ5V1j
62
62
  awscli/customizations/quicksight.py,sha256=r5XrHPIofOfKVZrE6JGUjDKovkgOf19nrsVVzWOHGDY,1457
63
63
  awscli/customizations/rds.py,sha256=49mfeoYOFtgO5iodjp8eG0H_DUQ7Y5W0NfPCLXd97HQ,4273
64
64
  awscli/customizations/rekognition.py,sha256=NHajCaaLkSC5YDmtJe-EdLdgmObrQetj6as0Diu_d3o,1813
65
- awscli/customizations/removals.py,sha256=OK-nzQa2HcufHRG5E4XYfyFxuJQdQczlu5y8KkT5Rco,4290
65
+ awscli/customizations/removals.py,sha256=-qS3C2TSHAPEEFc-lY5Ia1l74l4gNwFK6N8Ubkvg-MM,4435
66
66
  awscli/customizations/route53.py,sha256=TyEnjZz7bPegLQ23X5r1tNUJ1gSAmGeQBaF98t5PLmU,1187
67
67
  awscli/customizations/s3errormsg.py,sha256=STKQ3714dnXOzPSPszCikhv5hoRBUJnk-u0kFp7FaEU,2480
68
68
  awscli/customizations/s3events.py,sha256=ZcNmDN26dXxLrLawawl9jRFWqK1lMEQpty0YRNjBQws,4795
@@ -2494,44 +2494,60 @@ awscli/examples/efs/describe-tags.rst,sha256=bpmDRNsiswisOq_WsUv_TFhN-b4i7-broDF
2494
2494
  awscli/examples/efs/list-tags-for-resource.rst,sha256=XT4O-pAZ2yXx-yU53wLDv3nSPPEGj8mNQvTT1-S0N3g,698
2495
2495
  awscli/examples/efs/tag-resource.rst,sha256=LzchMBnIsdTEv_6oCuvrFMiO33o6kK5MPCybso7xRvE,484
2496
2496
  awscli/examples/efs/untag-resource.rst,sha256=l9P6rhgjDg66s5Ha_GW-wso2ruqlmcxv_KSyBQp8jf8,471
2497
+ awscli/examples/eks/associate-access-policy.rst,sha256=RVTTf9N2lcaMidHaBZajYEf8RYvF7fETn7ckTryt5LE,1221
2497
2498
  awscli/examples/eks/associate-encryption-config.rst,sha256=tv5_wkDATLpG6QfZVlhTBNi7apVVIbhNY4pnkNCiNoM,1170
2498
2499
  awscli/examples/eks/associate-identity-provider-config.rst,sha256=Ngps5URSDpGtrRESAfEqgAyMQrrAtxB7N-nDasvi5GA,1513
2500
+ awscli/examples/eks/create-access-entry.rst,sha256=x1oOGVVv4rp6K9PM1_J6Fy87cRUJUTXCRivCOn3kuuw,2481
2499
2501
  awscli/examples/eks/create-addon.rst,sha256=dvWd9yom0gvWT9UtxeBg7MAZ0muUJtNQ-9Rgh2jl2DI,8041
2500
2502
  awscli/examples/eks/create-cluster.rst,sha256=BoqkO9Ska7Guzqu1QNVFo2h-QitSR9xlWO2CUrZJFdc,3343
2501
2503
  awscli/examples/eks/create-fargate-profile.rst,sha256=EuZxSovZBCWgQfnLG77FIZCvJypCuFouLwMmfdMDbBg,9950
2502
2504
  awscli/examples/eks/create-nodegroup.rst,sha256=GyvTVQTAo5Ur8Xw472y8857gMhxfEkSTli2LIt3yubI,7366
2505
+ awscli/examples/eks/create-pod-identity-association.rst,sha256=RwfLb3NbUTcN135MxQ9rptljpeWyy-Qib6D1L1hRbRY,2545
2506
+ awscli/examples/eks/delete-access-entry.rst,sha256=eP332dawJLOwYmLHTe_X05_G7weFmDwjLPMMyk313eo,512
2503
2507
  awscli/examples/eks/delete-addon.rst,sha256=7TqWeKAu6gQ26JOIapPSAdu5wRvmdxszHBUBdxLU1ec,2304
2504
2508
  awscli/examples/eks/delete-cluster.rst,sha256=CeBmNmNXeyF0yS3Xo84GeZ4EHIKLSMaHnXQsYvQvwkk,3647
2505
2509
  awscli/examples/eks/delete-fargate-profile.rst,sha256=BZdTSGMa59Q7KmG-5Qlk4Bu9ebUv9Puqaf6LC7EUsek,1454
2506
2510
  awscli/examples/eks/delete-nodegroup.rst,sha256=H0gSAWirNX8kVJJa9yqmpi_K-o4AxCZ0rBljlErQGss,2075
2511
+ awscli/examples/eks/delete-pod-identity-association.rst,sha256=w8OftQ3m-S8AEDUHOSpty_7UQsgDsEl8SOTdot3TeT4,1209
2507
2512
  awscli/examples/eks/deregister-cluster.rst,sha256=0EaIG9t0nsyght_CUe9b55z1ohwy2SYrt9x_jqhmhDI,1118
2513
+ awscli/examples/eks/describe-access-entry.rst,sha256=KV-jUujbG1FlHPFBMrovxwzcNiQUdaQ-TuqefEBUpNs,1116
2508
2514
  awscli/examples/eks/describe-addon-configuration.rst,sha256=VRZyZpqiRyeBRlMfRkiJ_JrW54zuRw7D00N_juxS3gk,7232
2509
2515
  awscli/examples/eks/describe-addon-versions.rst,sha256=YT_O2aKstlINFnHFAKERyrTx9tY6JuG5DYaXJ_oi8ek,11954
2510
2516
  awscli/examples/eks/describe-addon.rst,sha256=o3g3OWkJcDHqrcsWzpP8Dia5FmTn1dtLv4u206kH4_A,1211
2511
2517
  awscli/examples/eks/describe-cluster.rst,sha256=2tHAIWQ7J6gk-kmqKUauJX8RwVmF-xArHD-a0pcbbdU,3585
2512
2518
  awscli/examples/eks/describe-fargate-profile.rst,sha256=RRuGqjcDo7A45ugnfJHg-QL3nWFVnQqNd4DWeVJF-L0,1557
2513
2519
  awscli/examples/eks/describe-identity-provider-config.rst,sha256=MkEnu603qrscluYq_I5UGZzAVu8pOwCK3IyEzDFhDPY,1660
2520
+ awscli/examples/eks/describe-insight.rst,sha256=n7GuV7h50uzU4jyMi1zXPsx8V8TNV2gdWyvy4Xhwias,1747
2514
2521
  awscli/examples/eks/describe-nodegroup.rst,sha256=GV8qJDSg0050jJSKlQxK3ORG6DB1z4SSIfYvL60mi0o,1859
2522
+ awscli/examples/eks/describe-pod-identity-association.rst,sha256=LYkoJ9el0_Xm5WIL9z7O2FJcO-u-5GlYBFjOJ6g4ThU,1151
2515
2523
  awscli/examples/eks/describe-update.rst,sha256=SvQOIUw-IbSZW6z2He6ChrXd75-drw-_3tUw_-acxCU,2974
2524
+ awscli/examples/eks/disassociate-access-policy.rst,sha256=FT8nR22yGn17-884gCEcrwYecu_6NROXbJmpxAOtPOc,605
2516
2525
  awscli/examples/eks/disassociate-identity-provider-config.rst,sha256=S3ZC7ADryxpn3QmtGKpsO5X-GTQy45m4-SjWfBk2xwY,1167
2517
2526
  awscli/examples/eks/get-token.rst,sha256=XgfKxeJqPE-XfOQyAzcH8gfjVGNsgVACn5Y68_VPW3w,1414
2527
+ awscli/examples/eks/list-access-entries.rst,sha256=tIMgPXm59Jtc2HsWqFqYAvKxF0ReXAhCVrGdveZahEM,744
2528
+ awscli/examples/eks/list-access-policies.rst,sha256=cDaJNqKRwiiSdDG5PgxQDTGxdtAtZm1EGmVDawIZqek,3771
2518
2529
  awscli/examples/eks/list-addons.rst,sha256=pAbDxXsgmtaTzdOIAj47DDWxUgDaU_n9xuWuwJbOjrc,391
2530
+ awscli/examples/eks/list-associated-access-policies.rst,sha256=1mpaV8Sm_lIue-IHg9qYZlLfXl3nCGI-wr0Htshap9U,1109
2519
2531
  awscli/examples/eks/list-clusters.rst,sha256=GQ2EeSbM1OrcJJ3AjkwbDyVRA9agF2hrWEbcCUGgONI,401
2520
2532
  awscli/examples/eks/list-fargate-profiles.rst,sha256=BxdU_974gRl5ogeqwVuPnqJl898urmmX44btKkH2Hbs,409
2521
2533
  awscli/examples/eks/list-identity-provider-configs.rst,sha256=o9vO4XF-DwW6XZq5q2M3qHaWZ9f_yb4wFf7FFlDAY38,698
2534
+ awscli/examples/eks/list-insights.rst,sha256=Gg_NWk9hHLliUidVnAXP7g22a5RroWX9fIZofHsEe4M,3310
2522
2535
  awscli/examples/eks/list-nodegroups.rst,sha256=H4E8rHXBUDhaXiR3EWFBkSEetdEDKA9ApDPZW4mG-5U,364
2536
+ awscli/examples/eks/list-pod-identity-associations.rst,sha256=cThvjniuCUDAYLUw9V58WyyZcqsmVtX4kKy9-JCCmZ8,2678
2523
2537
  awscli/examples/eks/list-tags-for-resource.rst,sha256=_u6k-mE7aQmhNbivJWhVb0FPhZ_hYwiV9TU6z80CfqU,4290
2524
2538
  awscli/examples/eks/list-update.rst,sha256=vyiU7XA1gutHLMbXhQyDv1m2Qb9hGZCQmsRMrS_HwOw,1295
2525
2539
  awscli/examples/eks/list-updates.rst,sha256=YwqUUuTOLzkzncmVg1J2YpKLx5PyZN0t7esNfMNQQcA,289
2526
2540
  awscli/examples/eks/register-cluster.rst,sha256=9ficF83hyhIVbJStQAHzVVsFXMfobCc1lNGVa2F6x_4,2530
2527
2541
  awscli/examples/eks/tag-resource.rst,sha256=dul6fX4819LhCc2MaZv-SfKBxBTvFBdnFqrfRystlYI,869
2528
2542
  awscli/examples/eks/untag-resource.rst,sha256=I28RzcJVA8H-J7R_7PTAxj0YtI9QDHo-hVv1awM_lDk,863
2543
+ awscli/examples/eks/update-access-entry.rst,sha256=khv_0jDlNWUADzglss0EqSXt_IqSQifGM64tKKb87f8,1177
2529
2544
  awscli/examples/eks/update-addon.rst,sha256=nwU3elxdhsUdlUFfa8LV1vgjAMpxFAM7sOXIubnEhuU,8524
2530
2545
  awscli/examples/eks/update-cluster-config.rst,sha256=BUv5hWQPB-ZBCjEqr4_R8Zj7JGKKVs_O8Yuu1nBiQ0I,1619
2531
2546
  awscli/examples/eks/update-cluster-version.rst,sha256=JUXS0GrGdtTbjOT9N_lUDhd1fyXuEm8yKe6KjmHArX4,1077
2532
2547
  awscli/examples/eks/update-kubeconfig.rst,sha256=McL_9xA3KST54Y7-AylWlEl1jlOG5n1Vid_JyEBoRww,4620
2533
2548
  awscli/examples/eks/update-nodegroup-config.rst,sha256=2HTWv17VZbq7wnwZlCu9h0cSmlt9C4o7LE0dUTW08D0,6583
2534
2549
  awscli/examples/eks/update-nodegroup-version.rst,sha256=ZJwGzWjOZFDWu8GewJwYnLvS4yTHq0CHMU4BFDIqaoI,2459
2550
+ awscli/examples/eks/update-pod-identity-association.rst,sha256=X3uvXP7487DzmeSq_6Fa31bA-lhB4x0DO_zvP2RwFvc,1408
2535
2551
  awscli/examples/eks/wait.rst,sha256=q4u9o0yZM6gGk7BJ3qf4uNw1ElDDqzdr4npp5vtfAAE,354
2536
2552
  awscli/examples/eks/update-kubeconfig/_description.rst,sha256=chkZW0gv_iguCI9_sdFqvP1gIw7YUBt6YsLaHwlF3aI,1781
2537
2553
  awscli/examples/eks/wait/addon-active.rst,sha256=twG4MgC3yvkSURSb47ZcfhOH8clNDmbky4eRNaYeZF4,409
@@ -6164,13 +6180,13 @@ awscli/topics/return-codes.rst,sha256=d9lpNFZwD75IiYcDEADQzu-4QiR8P28UPHkrNwPV5J
6164
6180
  awscli/topics/s3-config.rst,sha256=5EIVd4ggLBHtzjtHFvQp9hY415yMGZiG7S_rO9qy2t0,11663
6165
6181
  awscli/topics/s3-faq.rst,sha256=9qO0HFI6F9hx1wVEUDl8Jy6yoCUd9zbtv-Z0Re4dsiw,2934
6166
6182
  awscli/topics/topic-tags.json,sha256=6lUSrs3FKCZNRSQMnjcXNgWyRNGjZIeur1988a4IO5o,1577
6167
- awscli-1.41.6.data/scripts/aws,sha256=r24FExgs0-JjILTQ3XZAqXBYE4SV6UMTtALkLGAj86g,805
6168
- awscli-1.41.6.data/scripts/aws.cmd,sha256=s46DkC6LNgX63CIkzxxbPnFMJ6DRDBkvc88GnWa8Pvg,1432
6169
- awscli-1.41.6.data/scripts/aws_bash_completer,sha256=RRpoEGJRagRzyHZKZZOwpltuVYv2EoiZsdXhmyWPZ54,204
6170
- awscli-1.41.6.data/scripts/aws_completer,sha256=oC9kuMDlWE47dWk_4xjPde2PQvN-M0vND0J4YSLabVQ,1126
6171
- awscli-1.41.6.data/scripts/aws_zsh_completer.sh,sha256=Qm6Z8ejNAMzpJjaT0pzqxbSDT2zxdmzVe5haRA7qLoc,1808
6172
- awscli-1.41.6.dist-info/LICENSE.txt,sha256=o5XhFlwu0OK_BBrijlKCRa7dQAm36UrUB3gCV_cEr8E,549
6173
- awscli-1.41.6.dist-info/METADATA,sha256=DTv2nG3YJHpDhFkeTAzhuvGHt1d6LUdlycrBwwvYSOM,11104
6174
- awscli-1.41.6.dist-info/WHEEL,sha256=GV9aMThwP_4oNCtvEC2ec3qUYutgWeAzklro_0m4WJQ,91
6175
- awscli-1.41.6.dist-info/top_level.txt,sha256=vt9wXFr1_nGYK6abhJgt6zY3fULe4JSZedm_5XOM9S0,7
6176
- awscli-1.41.6.dist-info/RECORD,,
6183
+ awscli-1.41.8.data/scripts/aws,sha256=r24FExgs0-JjILTQ3XZAqXBYE4SV6UMTtALkLGAj86g,805
6184
+ awscli-1.41.8.data/scripts/aws.cmd,sha256=s46DkC6LNgX63CIkzxxbPnFMJ6DRDBkvc88GnWa8Pvg,1432
6185
+ awscli-1.41.8.data/scripts/aws_bash_completer,sha256=RRpoEGJRagRzyHZKZZOwpltuVYv2EoiZsdXhmyWPZ54,204
6186
+ awscli-1.41.8.data/scripts/aws_completer,sha256=oC9kuMDlWE47dWk_4xjPde2PQvN-M0vND0J4YSLabVQ,1126
6187
+ awscli-1.41.8.data/scripts/aws_zsh_completer.sh,sha256=Qm6Z8ejNAMzpJjaT0pzqxbSDT2zxdmzVe5haRA7qLoc,1808
6188
+ awscli-1.41.8.dist-info/LICENSE.txt,sha256=o5XhFlwu0OK_BBrijlKCRa7dQAm36UrUB3gCV_cEr8E,549
6189
+ awscli-1.41.8.dist-info/METADATA,sha256=-QtVRcCujJR9POi_YK-j28Lj86AkuMrl_jC6aqS-LfA,11104
6190
+ awscli-1.41.8.dist-info/WHEEL,sha256=GV9aMThwP_4oNCtvEC2ec3qUYutgWeAzklro_0m4WJQ,91
6191
+ awscli-1.41.8.dist-info/top_level.txt,sha256=vt9wXFr1_nGYK6abhJgt6zY3fULe4JSZedm_5XOM9S0,7
6192
+ awscli-1.41.8.dist-info/RECORD,,
File without changes