awscli 1.41.6__py3-none-any.whl → 1.41.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- awscli/__init__.py +1 -1
- awscli/customizations/removals.py +2 -0
- awscli/examples/eks/associate-access-policy.rst +29 -0
- awscli/examples/eks/create-access-entry.rst +54 -0
- awscli/examples/eks/create-pod-identity-association.rst +59 -0
- awscli/examples/eks/delete-access-entry.rst +11 -0
- awscli/examples/eks/delete-pod-identity-association.rst +28 -0
- awscli/examples/eks/describe-access-entry.rst +25 -0
- awscli/examples/eks/describe-insight.rst +36 -0
- awscli/examples/eks/describe-pod-identity-association.rst +28 -0
- awscli/examples/eks/disassociate-access-policy.rst +12 -0
- awscli/examples/eks/list-access-entries.rst +19 -0
- awscli/examples/eks/list-access-policies.rst +90 -0
- awscli/examples/eks/list-associated-access-policies.rst +27 -0
- awscli/examples/eks/list-insights.rst +67 -0
- awscli/examples/eks/list-pod-identity-associations.rst +61 -0
- awscli/examples/eks/update-access-entry.rst +28 -0
- awscli/examples/eks/update-pod-identity-association.rst +29 -0
- {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/METADATA +2 -2
- {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/RECORD +28 -12
- {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws +0 -0
- {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws.cmd +0 -0
- {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws_completer +0 -0
- {awscli-1.41.6.data → awscli-1.41.8.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/LICENSE.txt +0 -0
- {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/WHEEL +0 -0
- {awscli-1.41.6.dist-info → awscli-1.41.8.dist-info}/top_level.txt +0 -0
awscli/__init__.py
CHANGED
@@ -60,6 +60,8 @@ def register_removals(event_handler):
|
|
60
60
|
'invoke-inline-agent',
|
61
61
|
'optimize-prompt',
|
62
62
|
'retrieve-and-generate-stream'])
|
63
|
+
cmd_remover.remove(on_event='building-command-table.bedrock-agentcore',
|
64
|
+
remove_commands=['invoke-code-interpreter'])
|
63
65
|
cmd_remover.remove(on_event='building-command-table.qbusiness',
|
64
66
|
remove_commands=['chat'])
|
65
67
|
cmd_remover.remove(on_event='building-command-table.iotsitewise',
|
@@ -0,0 +1,29 @@
|
|
1
|
+
**To associate an access policy and its scope to the access entry of the cluster**
|
2
|
+
|
3
|
+
The following ``associate-access-policy`` associates an access policy and its scope to the access entry of the specified cluster. ::
|
4
|
+
|
5
|
+
aws eks associate-access-policy \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin \
|
8
|
+
--policy-arn arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy \
|
9
|
+
--access-scope type=namespace,namespaces=default
|
10
|
+
|
11
|
+
Output::
|
12
|
+
|
13
|
+
{
|
14
|
+
"clusterName": "eks-customer",
|
15
|
+
"principalArn": "arn:aws:iam::111122223333:role/Admin",
|
16
|
+
"associatedAccessPolicy": {
|
17
|
+
"policyArn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy",
|
18
|
+
"accessScope": {
|
19
|
+
"type": "namespace",
|
20
|
+
"namespaces": [
|
21
|
+
"default"
|
22
|
+
]
|
23
|
+
},
|
24
|
+
"associatedAt": "2025-05-24T15:59:51.981000-05:00",
|
25
|
+
"modifiedAt": "2025-05-24T15:59:51.981000-05:00"
|
26
|
+
}
|
27
|
+
}
|
28
|
+
|
29
|
+
For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,54 @@
|
|
1
|
+
**Example 1: To create the access entry for EKS cluster**
|
2
|
+
|
3
|
+
The following ``create-access-entry`` example creates an access entry that allows an IAM principal to access the EKS cluster. ::
|
4
|
+
|
5
|
+
aws eks create-access-entry \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:user/eks-user
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"accessEntry": {
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"principalArn": "arn:aws:iam::111122223333:user/eks-user",
|
15
|
+
"kubernetesGroups": [],
|
16
|
+
"accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/user/111122223333/eks-user/a1b2c3d4-5678-90ab-cdef-a6506e3d36p0",
|
17
|
+
"createdAt": "2025-04-14T22:45:48.097000-05:00",
|
18
|
+
"modifiedAt": "2025-04-14T22:45:48.097000-05:00",
|
19
|
+
"tags": {},
|
20
|
+
"username": "arn:aws:iam::111122223333:user/eks-user",
|
21
|
+
"type": "STANDARD"
|
22
|
+
}
|
23
|
+
}
|
24
|
+
|
25
|
+
For more information, see `Create access entries <https://docs.aws.amazon.com/eks/latest/userguide/creating-access-entries.html>`__ in the *Amazon EKS User Guide*.
|
26
|
+
|
27
|
+
**Example 2: To create the access entry for EKS cluster by specifying the type of access entry**
|
28
|
+
|
29
|
+
The following ``create-access-entry`` example creates an access entry of type ``EC2_LINUX`` in the EKS cluster. By default, a type ``STANDARD`` access entry is created. Apart from the default, if we specify any other access entry types, an IAM role ARN needs to be passed in the CLI. ::
|
30
|
+
|
31
|
+
aws eks create-access-entry \
|
32
|
+
--cluster-name eks-customer \
|
33
|
+
--principal-arn arn:aws:iam::111122223333:role/admin-test-ip \
|
34
|
+
--type EC2_LINUX
|
35
|
+
|
36
|
+
Output::
|
37
|
+
|
38
|
+
{
|
39
|
+
"accessEntry": {
|
40
|
+
"clusterName": "eks-customer",
|
41
|
+
"principalArn": "arn:aws:iam::111122223333:role/admin-test-ip",
|
42
|
+
"kubernetesGroups": [
|
43
|
+
"system:nodes"
|
44
|
+
],
|
45
|
+
"accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/role/111122223333/admin-test-ip/accb5418-f493-f390-3e6e-c3f19f725fcp",
|
46
|
+
"createdAt": "2025-05-06T19:42:45.453000-05:00",
|
47
|
+
"modifiedAt": "2025-05-06T19:42:45.453000-05:00",
|
48
|
+
"tags": {},
|
49
|
+
"username": "system:node:{{EC2PrivateDNSName}}",
|
50
|
+
"type": "EC2_LINUX"
|
51
|
+
}
|
52
|
+
}
|
53
|
+
|
54
|
+
For more information, see `Create access entries <https://docs.aws.amazon.com/eks/latest/userguide/creating-access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,59 @@
|
|
1
|
+
**Example 1: To create an EKS Pod Identity association in EKS cluster**
|
2
|
+
|
3
|
+
The following ``create-pod-identity-association`` example creates an EKS Pod Identity association between a service account in the EKS cluster and an IAM role. ::
|
4
|
+
|
5
|
+
aws eks create-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--namespace default \
|
8
|
+
--service-account default \
|
9
|
+
--role-arn arn:aws:iam::111122223333:role/my-role
|
10
|
+
|
11
|
+
Output::
|
12
|
+
|
13
|
+
{
|
14
|
+
"association": {
|
15
|
+
"clusterName": "eks-customer",
|
16
|
+
"namespace": "default",
|
17
|
+
"serviceAccount": "default",
|
18
|
+
"roleArn": "arn:aws:iam::111122223333:role/my-role",
|
19
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-8mvwvh57cu74mgcst",
|
20
|
+
"associationId": "a-8mvwvh57cu74mgcst",
|
21
|
+
"tags": {},
|
22
|
+
"createdAt": "2025-05-24T19:40:13.961000-05:00",
|
23
|
+
"modifiedAt": "2025-05-24T19:40:13.961000-05:00"
|
24
|
+
}
|
25
|
+
}
|
26
|
+
|
27
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
28
|
+
|
29
|
+
**Example 2: To create an EKS Pod Identity association in EKS cluster with tags**
|
30
|
+
|
31
|
+
The following ``create-pod-identity-association`` creates an EKS Pod Identity association between a service account and an IAM role in the EKS cluster with tags. ::
|
32
|
+
|
33
|
+
aws eks create-pod-identity-association \
|
34
|
+
--cluster-name eks-customer \
|
35
|
+
--namespace default \
|
36
|
+
--service-account default \
|
37
|
+
--role-arn arn:aws:iam::111122223333:role/my-role \
|
38
|
+
--tags Key1=value1,Key2=value2
|
39
|
+
|
40
|
+
Output::
|
41
|
+
|
42
|
+
{
|
43
|
+
"association": {
|
44
|
+
"clusterName": "eks-customer",
|
45
|
+
"namespace": "default",
|
46
|
+
"serviceAccount": "default",
|
47
|
+
"roleArn": "arn:aws:iam::111122223333:role/my-role",
|
48
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgoda",
|
49
|
+
"associationId": "a-9njjin9gfghecgoda",
|
50
|
+
"tags": {
|
51
|
+
"Key2": "value2",
|
52
|
+
"Key1": "value1"
|
53
|
+
},
|
54
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
55
|
+
"modifiedAt": "2025-05-24T19:52:14.135000-05:00"
|
56
|
+
}
|
57
|
+
}
|
58
|
+
|
59
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,11 @@
|
|
1
|
+
**To delete an access entry associated with the cluster**
|
2
|
+
|
3
|
+
The following ``delete-access-entry`` deletes an access entry associated with the EKS cluster named ``eks-customer``. ::
|
4
|
+
|
5
|
+
aws eks delete-access-entry \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin
|
8
|
+
|
9
|
+
This command produces no output.
|
10
|
+
|
11
|
+
For more information, see `Delete access entries <https://docs.aws.amazon.com/eks/latest/userguide/deleting-access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,28 @@
|
|
1
|
+
**To delete the EKS Pod Identity association**
|
2
|
+
|
3
|
+
The following ``delete-pod-identity-association`` example deletes the EKS Pod Identity association with association ID ``a-9njjin9gfghecgocd`` from the EKS cluster named ``eks-customer``. ::
|
4
|
+
|
5
|
+
aws eks delete-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--association-id a-9njjin9gfghecgocd
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"association": {
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"namespace": "default",
|
15
|
+
"serviceAccount": "default",
|
16
|
+
"roleArn": "arn:aws:iam::111122223333:role/s3-role",
|
17
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
18
|
+
"associationId": "a-9njjin9gfghecgocd",
|
19
|
+
"tags": {
|
20
|
+
"Key2": "value2",
|
21
|
+
"Key1": "value1"
|
22
|
+
},
|
23
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
24
|
+
"modifiedAt": "2025-05-25T21:10:56.923000-05:00"
|
25
|
+
}
|
26
|
+
}
|
27
|
+
|
28
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,25 @@
|
|
1
|
+
**To describe the access entry for EKS cluster**
|
2
|
+
|
3
|
+
The following ``describe-access-entry`` example describes an access entry for the EKS cluster. ::
|
4
|
+
|
5
|
+
aws eks describe-access-entry \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:user/eks-admin-user
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"accessEntry": {
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"principalArn": "arn:aws:iam::111122223333:user/eks-admin-user",
|
15
|
+
"kubernetesGroups": [],
|
16
|
+
"accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/user/111122223333/eks-admin-user/0acb1bc6-cb0a-ede6-11ae-a6506e3d36p0",
|
17
|
+
"createdAt": "2025-04-14T22:45:48.097000-05:00",
|
18
|
+
"modifiedAt": "2025-04-14T22:45:48.097000-05:00",
|
19
|
+
"tags": {},
|
20
|
+
"username": "arn:aws:iam::111122223333:user/eks-admin-user",
|
21
|
+
"type": "STANDARD"
|
22
|
+
}
|
23
|
+
}
|
24
|
+
|
25
|
+
For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,36 @@
|
|
1
|
+
**To get the details of an insight for an EKS cluster using its ID**
|
2
|
+
|
3
|
+
The following ``describe-insight`` example returns the details about the insight specified using the cluster name and insight ID. ::
|
4
|
+
|
5
|
+
aws eks describe-insight \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--id 38ea7a64-a14f-4e0e-95c7-8dbcab3c3623
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"insight": {
|
13
|
+
"id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3623",
|
14
|
+
"name": "Kubelet version skew",
|
15
|
+
"category": "UPGRADE_READINESS",
|
16
|
+
"kubernetesVersion": "1.33",
|
17
|
+
"lastRefreshTime": "2025-05-24T11:22:50-05:00",
|
18
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
19
|
+
"description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
|
20
|
+
"insightStatus": {
|
21
|
+
"status": "PASSING",
|
22
|
+
"reason": "Node kubelet versions match the cluster control plane version."
|
23
|
+
},
|
24
|
+
"recommendation": "Upgrade your worker nodes to match the Kubernetes version of your cluster control plane.",
|
25
|
+
"additionalInfo": {
|
26
|
+
"Kubelet version skew policy": "https://kubernetes.io/releases/version-skew-policy/#kubelet",
|
27
|
+
"Updating a managed node group": "https://docs.aws.amazon.com/eks/latest/userguide/update-managed-node-group.html"
|
28
|
+
},
|
29
|
+
"resources": [],
|
30
|
+
"categorySpecificSummary": {
|
31
|
+
"deprecationDetails": []
|
32
|
+
}
|
33
|
+
}
|
34
|
+
}
|
35
|
+
|
36
|
+
For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,28 @@
|
|
1
|
+
**To provide the details about Pod Identity association**
|
2
|
+
|
3
|
+
The following ``describe-pod-identity-association`` example describes a Pod Identity association in the EKS cluster. ::
|
4
|
+
|
5
|
+
aws eks describe-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--association-id a-9njjin9gfghecgocd
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"association": {
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"namespace": "default",
|
15
|
+
"serviceAccount": "default",
|
16
|
+
"roleArn": "arn:aws:iam::111122223333:role/my-role",
|
17
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
18
|
+
"associationId": "a-9njjin9gfghecgocd",
|
19
|
+
"tags": {
|
20
|
+
"Key2": "value2",
|
21
|
+
"Key1": "value1"
|
22
|
+
},
|
23
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
24
|
+
"modifiedAt": "2025-05-24T19:52:14.135000-05:00"
|
25
|
+
}
|
26
|
+
}
|
27
|
+
|
28
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,12 @@
|
|
1
|
+
**To disassociate the access policy from an access entry**
|
2
|
+
|
3
|
+
The following ``disassociate-access-policy`` removes the access policy associated with the access entry. ::
|
4
|
+
|
5
|
+
aws eks disassociate-access-policy \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin \
|
8
|
+
--policy-arn arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy
|
9
|
+
|
10
|
+
This command produces no output.
|
11
|
+
|
12
|
+
For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,19 @@
|
|
1
|
+
**To list the access entries for an EKS cluster**
|
2
|
+
|
3
|
+
The following ``list-access-entries`` returns the list of access entries associated with the EKS cluster ``eks-customer``. ::
|
4
|
+
|
5
|
+
aws eks list-access-entries \
|
6
|
+
--cluster-name eks-customer
|
7
|
+
|
8
|
+
Output::
|
9
|
+
|
10
|
+
{
|
11
|
+
"accessEntries": [
|
12
|
+
"arn:aws:iam::111122223333:role/Admin",
|
13
|
+
"arn:aws:iam::111122223333:role/admin-test-ip",
|
14
|
+
"arn:aws:iam::111122223333:role/assume-worker-node-role",
|
15
|
+
"arn:aws:iam::111122223333:user/eks-admin-user"
|
16
|
+
]
|
17
|
+
}
|
18
|
+
|
19
|
+
For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,90 @@
|
|
1
|
+
**To list all available access policies**
|
2
|
+
|
3
|
+
This ``list-access-policies`` example returns the list of all available access policies. ::
|
4
|
+
|
5
|
+
aws eks list-access-policies
|
6
|
+
|
7
|
+
Output::
|
8
|
+
|
9
|
+
{
|
10
|
+
"accessPolicies": [
|
11
|
+
{
|
12
|
+
"name": "AmazonEKSAdminPolicy",
|
13
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy"
|
14
|
+
},
|
15
|
+
{
|
16
|
+
"name": "AmazonEKSAdminViewPolicy",
|
17
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminViewPolicy"
|
18
|
+
},
|
19
|
+
{
|
20
|
+
"name": "AmazonEKSAutoNodePolicy",
|
21
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAutoNodePolicy"
|
22
|
+
},
|
23
|
+
{
|
24
|
+
"name": "AmazonEKSBlockStorageClusterPolicy",
|
25
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStorageClusterPolicy"
|
26
|
+
},
|
27
|
+
{
|
28
|
+
"name": "AmazonEKSBlockStoragePolicy",
|
29
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStoragePolicy"
|
30
|
+
},
|
31
|
+
{
|
32
|
+
"name": "AmazonEKSClusterAdminPolicy",
|
33
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
|
34
|
+
},
|
35
|
+
{
|
36
|
+
"name": "AmazonEKSComputeClusterPolicy",
|
37
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputeClusterPolicy"
|
38
|
+
},
|
39
|
+
{
|
40
|
+
"name": "AmazonEKSComputePolicy",
|
41
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputePolicy"
|
42
|
+
},
|
43
|
+
{
|
44
|
+
"name": "AmazonEKSEditPolicy",
|
45
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy"
|
46
|
+
},
|
47
|
+
{
|
48
|
+
"name": "AmazonEKSHybridPolicy",
|
49
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSHybridPolicy"
|
50
|
+
},
|
51
|
+
{
|
52
|
+
"name": "AmazonEKSLoadBalancingClusterPolicy",
|
53
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingClusterPolicy"
|
54
|
+
},
|
55
|
+
{
|
56
|
+
"name": "AmazonEKSLoadBalancingPolicy",
|
57
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingPolicy"
|
58
|
+
},
|
59
|
+
{
|
60
|
+
"name": "AmazonEKSNetworkingClusterPolicy",
|
61
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingClusterPolicy"
|
62
|
+
},
|
63
|
+
{
|
64
|
+
"name": "AmazonEKSNetworkingPolicy",
|
65
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingPolicy"
|
66
|
+
},
|
67
|
+
{
|
68
|
+
"name": "AmazonEKSViewPolicy",
|
69
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"
|
70
|
+
},
|
71
|
+
{
|
72
|
+
"name": "AmazonEMRJobPolicy",
|
73
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEMRJobPolicy"
|
74
|
+
},
|
75
|
+
{
|
76
|
+
"name": "AmazonSagemakerHyperpodClusterPolicy",
|
77
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodClusterPolicy"
|
78
|
+
},
|
79
|
+
{
|
80
|
+
"name": "AmazonSagemakerHyperpodControllerPolicy",
|
81
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodControllerPolicy"
|
82
|
+
},
|
83
|
+
{
|
84
|
+
"name": "AmazonSagemakerHyperpodSystemNamespacePolicy",
|
85
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodSystemNamespacePolicy"
|
86
|
+
}
|
87
|
+
]
|
88
|
+
}
|
89
|
+
|
90
|
+
For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,27 @@
|
|
1
|
+
**To list the access policies associated with an access entry**
|
2
|
+
|
3
|
+
The following ``list-associated-access-policies`` example returns the list of access policies associated with an access entry in the EKS cluster. ::
|
4
|
+
|
5
|
+
aws eks list-associated-access-policies \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"associatedAccessPolicies": [
|
13
|
+
{
|
14
|
+
"policyArn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy",
|
15
|
+
"accessScope": {
|
16
|
+
"type": "cluster",
|
17
|
+
"namespaces": []
|
18
|
+
},
|
19
|
+
"associatedAt": "2025-05-24T17:26:22.935000-05:00",
|
20
|
+
"modifiedAt": "2025-05-24T17:26:22.935000-05:00"
|
21
|
+
}
|
22
|
+
],
|
23
|
+
"clusterName": "eks-customer",
|
24
|
+
"principalArn": "arn:aws:iam::111122223333:role/Admin"
|
25
|
+
}
|
26
|
+
|
27
|
+
For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,67 @@
|
|
1
|
+
**To list all insights for the specified cluster**
|
2
|
+
|
3
|
+
The following ``list-insights`` example returns the list of all insights checked against the specified cluster. ::
|
4
|
+
|
5
|
+
aws eks list-insights \
|
6
|
+
--cluster-name eks-customer
|
7
|
+
|
8
|
+
Output::
|
9
|
+
|
10
|
+
{
|
11
|
+
"insights": [
|
12
|
+
{
|
13
|
+
"id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3616",
|
14
|
+
"name": "Kubelet version skew",
|
15
|
+
"category": "UPGRADE_READINESS",
|
16
|
+
"kubernetesVersion": "1.33",
|
17
|
+
"lastRefreshTime": "2025-05-24T11:22:50-05:00",
|
18
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
19
|
+
"description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
|
20
|
+
"insightStatus": {
|
21
|
+
"status": "PASSING",
|
22
|
+
"reason": "Node kubelet versions match the cluster control plane version."
|
23
|
+
}
|
24
|
+
},
|
25
|
+
{
|
26
|
+
"id": "9cd91472-f99c-45a9-b7d7-54d4900dee23",
|
27
|
+
"name": "EKS add-on version compatibility",
|
28
|
+
"category": "UPGRADE_READINESS",
|
29
|
+
"kubernetesVersion": "1.33",
|
30
|
+
"lastRefreshTime": "2025-05-24T11:22:59-05:00",
|
31
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
32
|
+
"description": "Checks version of installed EKS add-ons to ensure they are compatible with the next version of Kubernetes. ",
|
33
|
+
"insightStatus": {
|
34
|
+
"status": "PASSING",
|
35
|
+
"reason": "All installed EKS add-on versions are compatible with next Kubernetes version."
|
36
|
+
}
|
37
|
+
},
|
38
|
+
{
|
39
|
+
"id": "0deb269d-b1e1-458c-a2b4-7a57f940c875",
|
40
|
+
"name": "Cluster health issues",
|
41
|
+
"category": "UPGRADE_READINESS",
|
42
|
+
"kubernetesVersion": "1.33",
|
43
|
+
"lastRefreshTime": "2025-05-24T11:22:59-05:00",
|
44
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
45
|
+
"description": "Checks for any cluster health issues that prevent successful upgrade to the next Kubernetes version on EKS.",
|
46
|
+
"insightStatus": {
|
47
|
+
"status": "PASSING",
|
48
|
+
"reason": "No cluster health issues detected."
|
49
|
+
}
|
50
|
+
},
|
51
|
+
{
|
52
|
+
"id": "214fa274-344f-420b-812a-5049ce72c9ww",
|
53
|
+
"name": "kube-proxy version skew",
|
54
|
+
"category": "UPGRADE_READINESS",
|
55
|
+
"kubernetesVersion": "1.33",
|
56
|
+
"lastRefreshTime": "2025-05-24T11:22:50-05:00",
|
57
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
58
|
+
"description": "Checks version of kube-proxy in cluster to see if upgrade would cause noncompliance with supported Kubernetes kube-proxy version skew policy.",
|
59
|
+
"insightStatus": {
|
60
|
+
"status": "PASSING",
|
61
|
+
"reason": "kube-proxy versions match the cluster control plane version."
|
62
|
+
}
|
63
|
+
}
|
64
|
+
]
|
65
|
+
}
|
66
|
+
|
67
|
+
For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,61 @@
|
|
1
|
+
**Example 1: To list the Pod Identity associations in an EKS cluster**
|
2
|
+
|
3
|
+
The following ``list-pod-identity-associations`` returns the list of Pod Identity associations associated with the EKS cluster named ``eks-customer`` in all namespaces and service accounts. ::
|
4
|
+
|
5
|
+
aws eks list-pod-identity-associations \
|
6
|
+
--cluster-name eks-customer
|
7
|
+
|
8
|
+
Output::
|
9
|
+
|
10
|
+
{
|
11
|
+
"associations": [
|
12
|
+
{
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"namespace": "default",
|
15
|
+
"serviceAccount": "default",
|
16
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
17
|
+
"associationId": "a-9njjin9gfghecgocd"
|
18
|
+
},
|
19
|
+
{
|
20
|
+
"clusterName": "eks-customer",
|
21
|
+
"namespace": "kube-system",
|
22
|
+
"serviceAccount": "eks-customer",
|
23
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
|
24
|
+
"associationId": "a-dvtacahdvjn01ffbc"
|
25
|
+
},
|
26
|
+
{
|
27
|
+
"clusterName": "eks-customer",
|
28
|
+
"namespace": "kube-system",
|
29
|
+
"serviceAccount": "coredns",
|
30
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-yrpsdroc4ei7k6xps",
|
31
|
+
"associationId": "a-yrpsdroc4ei7k6xps"
|
32
|
+
}
|
33
|
+
]
|
34
|
+
}
|
35
|
+
|
36
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
37
|
+
|
38
|
+
**Example 2: To list the Pod Identity associations in an EKS cluster based on namespace and service account**
|
39
|
+
|
40
|
+
The following ``list-pod-identity-associations`` returns the list of Pod Identity associations in the EKS cluster based on namespace and service account. ::
|
41
|
+
|
42
|
+
aws eks list-pod-identity-associations \
|
43
|
+
--cluster-name eks-customer \
|
44
|
+
--namespace kube-system \
|
45
|
+
--service-account eks-customer
|
46
|
+
|
47
|
+
Output::
|
48
|
+
|
49
|
+
{
|
50
|
+
"associations": [
|
51
|
+
{
|
52
|
+
"clusterName": "eks-customer",
|
53
|
+
"namespace": "kube-system",
|
54
|
+
"serviceAccount": "eks-customer",
|
55
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
|
56
|
+
"associationId": "a-dvtacahdvjn01ffbc"
|
57
|
+
}
|
58
|
+
]
|
59
|
+
}
|
60
|
+
|
61
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,28 @@
|
|
1
|
+
**To update an access entry for an EKS cluster**
|
2
|
+
|
3
|
+
The following ``update-access-entry`` updates an access entry for the EKS cluster by adding the Kubernetes group ``tester``. ::
|
4
|
+
|
5
|
+
aws eks update-access-entry \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin \
|
8
|
+
--kubernetes-groups tester
|
9
|
+
|
10
|
+
Output::
|
11
|
+
|
12
|
+
{
|
13
|
+
"accessEntry": {
|
14
|
+
"clusterName": "eks-customer",
|
15
|
+
"principalArn": "arn:aws:iam::111122223333:role/Admin",
|
16
|
+
"kubernetesGroups": [
|
17
|
+
"tester"
|
18
|
+
],
|
19
|
+
"accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/role/111122223333/Admin/d2cb8183-d6ec-b82a-d967-eca21902a4b4",
|
20
|
+
"createdAt": "2025-05-24T11:02:04.432000-05:00",
|
21
|
+
"modifiedAt": "2025-05-24T17:08:01.608000-05:00",
|
22
|
+
"tags": {},
|
23
|
+
"username": "arn:aws:sts::111122223333:assumed-role/Admin/{{SessionName}}",
|
24
|
+
"type": "STANDARD"
|
25
|
+
}
|
26
|
+
}
|
27
|
+
|
28
|
+
For more information, see `Update access entries <https://docs.aws.amazon.com/eks/latest/userguide/updating-access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,29 @@
|
|
1
|
+
**To update the EKS Pod Identity association**
|
2
|
+
|
3
|
+
The following ``update-pod-identity-association`` example updates an EKS Pod Identity association by changing the associated IAM role from ``arn:aws:iam::111122223333:role/my-role`` to ``arn:aws:iam::111122223333:role/s3-role`` for association ID ``a-9njjin9gfghecgocd``. This API only allows updating the associated IAM role. ::
|
4
|
+
|
5
|
+
aws eks update-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--association-id a-9njjin9gfghecgocd \
|
8
|
+
--role-arn arn:aws:iam::111122223333:role/s3-role
|
9
|
+
|
10
|
+
Output::
|
11
|
+
|
12
|
+
{
|
13
|
+
"association": {
|
14
|
+
"clusterName": "eks-customer",
|
15
|
+
"namespace": "default",
|
16
|
+
"serviceAccount": "default",
|
17
|
+
"roleArn": "arn:aws:iam::111122223333:role/s3-role",
|
18
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
19
|
+
"associationId": "a-9njjin9gfghecgocd",
|
20
|
+
"tags": {
|
21
|
+
"Key2": "value2",
|
22
|
+
"Key1": "value1"
|
23
|
+
},
|
24
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
25
|
+
"modifiedAt": "2025-05-25T21:01:53.120000-05:00"
|
26
|
+
}
|
27
|
+
}
|
28
|
+
|
29
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: awscli
|
3
|
-
Version: 1.41.
|
3
|
+
Version: 1.41.8
|
4
4
|
Summary: Universal Command Line Environment for AWS.
|
5
5
|
Home-page: http://aws.amazon.com/cli/
|
6
6
|
Author: Amazon Web Services
|
@@ -23,7 +23,7 @@ Classifier: Programming Language :: Python :: 3.12
|
|
23
23
|
Classifier: Programming Language :: Python :: 3.13
|
24
24
|
Requires-Python: >= 3.9
|
25
25
|
License-File: LICENSE.txt
|
26
|
-
Requires-Dist: botocore (==1.39.
|
26
|
+
Requires-Dist: botocore (==1.39.8)
|
27
27
|
Requires-Dist: docutils (<=0.19,>=0.18.1)
|
28
28
|
Requires-Dist: s3transfer (<0.14.0,>=0.13.0)
|
29
29
|
Requires-Dist: PyYAML (<6.1,>=3.10)
|
@@ -1,4 +1,4 @@
|
|
1
|
-
awscli/__init__.py,sha256=
|
1
|
+
awscli/__init__.py,sha256=4DzhJ86VoitSY2QAwKenJP6Uuz8LoOeGcXirtxGu9DA,1533
|
2
2
|
awscli/__main__.py,sha256=iBjOg0tBxNlhzTi_tyc1G0SMGBvHMVvBJzX3JqYaooY,662
|
3
3
|
awscli/alias.py,sha256=Jj2jetpajUMcjqx9tFhHUOKpzLChQygnH2zqDFfmgIM,11315
|
4
4
|
awscli/argparser.py,sha256=3Pxx-vWytdV985Y6MIl9DeutUXyehIvACIs_PDby8GI,7650
|
@@ -62,7 +62,7 @@ awscli/customizations/putmetricdata.py,sha256=FczJBZUGb4mXtSalD1ihwDSjMSDlxZ5V1j
|
|
62
62
|
awscli/customizations/quicksight.py,sha256=r5XrHPIofOfKVZrE6JGUjDKovkgOf19nrsVVzWOHGDY,1457
|
63
63
|
awscli/customizations/rds.py,sha256=49mfeoYOFtgO5iodjp8eG0H_DUQ7Y5W0NfPCLXd97HQ,4273
|
64
64
|
awscli/customizations/rekognition.py,sha256=NHajCaaLkSC5YDmtJe-EdLdgmObrQetj6as0Diu_d3o,1813
|
65
|
-
awscli/customizations/removals.py,sha256
|
65
|
+
awscli/customizations/removals.py,sha256=-qS3C2TSHAPEEFc-lY5Ia1l74l4gNwFK6N8Ubkvg-MM,4435
|
66
66
|
awscli/customizations/route53.py,sha256=TyEnjZz7bPegLQ23X5r1tNUJ1gSAmGeQBaF98t5PLmU,1187
|
67
67
|
awscli/customizations/s3errormsg.py,sha256=STKQ3714dnXOzPSPszCikhv5hoRBUJnk-u0kFp7FaEU,2480
|
68
68
|
awscli/customizations/s3events.py,sha256=ZcNmDN26dXxLrLawawl9jRFWqK1lMEQpty0YRNjBQws,4795
|
@@ -2494,44 +2494,60 @@ awscli/examples/efs/describe-tags.rst,sha256=bpmDRNsiswisOq_WsUv_TFhN-b4i7-broDF
|
|
2494
2494
|
awscli/examples/efs/list-tags-for-resource.rst,sha256=XT4O-pAZ2yXx-yU53wLDv3nSPPEGj8mNQvTT1-S0N3g,698
|
2495
2495
|
awscli/examples/efs/tag-resource.rst,sha256=LzchMBnIsdTEv_6oCuvrFMiO33o6kK5MPCybso7xRvE,484
|
2496
2496
|
awscli/examples/efs/untag-resource.rst,sha256=l9P6rhgjDg66s5Ha_GW-wso2ruqlmcxv_KSyBQp8jf8,471
|
2497
|
+
awscli/examples/eks/associate-access-policy.rst,sha256=RVTTf9N2lcaMidHaBZajYEf8RYvF7fETn7ckTryt5LE,1221
|
2497
2498
|
awscli/examples/eks/associate-encryption-config.rst,sha256=tv5_wkDATLpG6QfZVlhTBNi7apVVIbhNY4pnkNCiNoM,1170
|
2498
2499
|
awscli/examples/eks/associate-identity-provider-config.rst,sha256=Ngps5URSDpGtrRESAfEqgAyMQrrAtxB7N-nDasvi5GA,1513
|
2500
|
+
awscli/examples/eks/create-access-entry.rst,sha256=x1oOGVVv4rp6K9PM1_J6Fy87cRUJUTXCRivCOn3kuuw,2481
|
2499
2501
|
awscli/examples/eks/create-addon.rst,sha256=dvWd9yom0gvWT9UtxeBg7MAZ0muUJtNQ-9Rgh2jl2DI,8041
|
2500
2502
|
awscli/examples/eks/create-cluster.rst,sha256=BoqkO9Ska7Guzqu1QNVFo2h-QitSR9xlWO2CUrZJFdc,3343
|
2501
2503
|
awscli/examples/eks/create-fargate-profile.rst,sha256=EuZxSovZBCWgQfnLG77FIZCvJypCuFouLwMmfdMDbBg,9950
|
2502
2504
|
awscli/examples/eks/create-nodegroup.rst,sha256=GyvTVQTAo5Ur8Xw472y8857gMhxfEkSTli2LIt3yubI,7366
|
2505
|
+
awscli/examples/eks/create-pod-identity-association.rst,sha256=RwfLb3NbUTcN135MxQ9rptljpeWyy-Qib6D1L1hRbRY,2545
|
2506
|
+
awscli/examples/eks/delete-access-entry.rst,sha256=eP332dawJLOwYmLHTe_X05_G7weFmDwjLPMMyk313eo,512
|
2503
2507
|
awscli/examples/eks/delete-addon.rst,sha256=7TqWeKAu6gQ26JOIapPSAdu5wRvmdxszHBUBdxLU1ec,2304
|
2504
2508
|
awscli/examples/eks/delete-cluster.rst,sha256=CeBmNmNXeyF0yS3Xo84GeZ4EHIKLSMaHnXQsYvQvwkk,3647
|
2505
2509
|
awscli/examples/eks/delete-fargate-profile.rst,sha256=BZdTSGMa59Q7KmG-5Qlk4Bu9ebUv9Puqaf6LC7EUsek,1454
|
2506
2510
|
awscli/examples/eks/delete-nodegroup.rst,sha256=H0gSAWirNX8kVJJa9yqmpi_K-o4AxCZ0rBljlErQGss,2075
|
2511
|
+
awscli/examples/eks/delete-pod-identity-association.rst,sha256=w8OftQ3m-S8AEDUHOSpty_7UQsgDsEl8SOTdot3TeT4,1209
|
2507
2512
|
awscli/examples/eks/deregister-cluster.rst,sha256=0EaIG9t0nsyght_CUe9b55z1ohwy2SYrt9x_jqhmhDI,1118
|
2513
|
+
awscli/examples/eks/describe-access-entry.rst,sha256=KV-jUujbG1FlHPFBMrovxwzcNiQUdaQ-TuqefEBUpNs,1116
|
2508
2514
|
awscli/examples/eks/describe-addon-configuration.rst,sha256=VRZyZpqiRyeBRlMfRkiJ_JrW54zuRw7D00N_juxS3gk,7232
|
2509
2515
|
awscli/examples/eks/describe-addon-versions.rst,sha256=YT_O2aKstlINFnHFAKERyrTx9tY6JuG5DYaXJ_oi8ek,11954
|
2510
2516
|
awscli/examples/eks/describe-addon.rst,sha256=o3g3OWkJcDHqrcsWzpP8Dia5FmTn1dtLv4u206kH4_A,1211
|
2511
2517
|
awscli/examples/eks/describe-cluster.rst,sha256=2tHAIWQ7J6gk-kmqKUauJX8RwVmF-xArHD-a0pcbbdU,3585
|
2512
2518
|
awscli/examples/eks/describe-fargate-profile.rst,sha256=RRuGqjcDo7A45ugnfJHg-QL3nWFVnQqNd4DWeVJF-L0,1557
|
2513
2519
|
awscli/examples/eks/describe-identity-provider-config.rst,sha256=MkEnu603qrscluYq_I5UGZzAVu8pOwCK3IyEzDFhDPY,1660
|
2520
|
+
awscli/examples/eks/describe-insight.rst,sha256=n7GuV7h50uzU4jyMi1zXPsx8V8TNV2gdWyvy4Xhwias,1747
|
2514
2521
|
awscli/examples/eks/describe-nodegroup.rst,sha256=GV8qJDSg0050jJSKlQxK3ORG6DB1z4SSIfYvL60mi0o,1859
|
2522
|
+
awscli/examples/eks/describe-pod-identity-association.rst,sha256=LYkoJ9el0_Xm5WIL9z7O2FJcO-u-5GlYBFjOJ6g4ThU,1151
|
2515
2523
|
awscli/examples/eks/describe-update.rst,sha256=SvQOIUw-IbSZW6z2He6ChrXd75-drw-_3tUw_-acxCU,2974
|
2524
|
+
awscli/examples/eks/disassociate-access-policy.rst,sha256=FT8nR22yGn17-884gCEcrwYecu_6NROXbJmpxAOtPOc,605
|
2516
2525
|
awscli/examples/eks/disassociate-identity-provider-config.rst,sha256=S3ZC7ADryxpn3QmtGKpsO5X-GTQy45m4-SjWfBk2xwY,1167
|
2517
2526
|
awscli/examples/eks/get-token.rst,sha256=XgfKxeJqPE-XfOQyAzcH8gfjVGNsgVACn5Y68_VPW3w,1414
|
2527
|
+
awscli/examples/eks/list-access-entries.rst,sha256=tIMgPXm59Jtc2HsWqFqYAvKxF0ReXAhCVrGdveZahEM,744
|
2528
|
+
awscli/examples/eks/list-access-policies.rst,sha256=cDaJNqKRwiiSdDG5PgxQDTGxdtAtZm1EGmVDawIZqek,3771
|
2518
2529
|
awscli/examples/eks/list-addons.rst,sha256=pAbDxXsgmtaTzdOIAj47DDWxUgDaU_n9xuWuwJbOjrc,391
|
2530
|
+
awscli/examples/eks/list-associated-access-policies.rst,sha256=1mpaV8Sm_lIue-IHg9qYZlLfXl3nCGI-wr0Htshap9U,1109
|
2519
2531
|
awscli/examples/eks/list-clusters.rst,sha256=GQ2EeSbM1OrcJJ3AjkwbDyVRA9agF2hrWEbcCUGgONI,401
|
2520
2532
|
awscli/examples/eks/list-fargate-profiles.rst,sha256=BxdU_974gRl5ogeqwVuPnqJl898urmmX44btKkH2Hbs,409
|
2521
2533
|
awscli/examples/eks/list-identity-provider-configs.rst,sha256=o9vO4XF-DwW6XZq5q2M3qHaWZ9f_yb4wFf7FFlDAY38,698
|
2534
|
+
awscli/examples/eks/list-insights.rst,sha256=Gg_NWk9hHLliUidVnAXP7g22a5RroWX9fIZofHsEe4M,3310
|
2522
2535
|
awscli/examples/eks/list-nodegroups.rst,sha256=H4E8rHXBUDhaXiR3EWFBkSEetdEDKA9ApDPZW4mG-5U,364
|
2536
|
+
awscli/examples/eks/list-pod-identity-associations.rst,sha256=cThvjniuCUDAYLUw9V58WyyZcqsmVtX4kKy9-JCCmZ8,2678
|
2523
2537
|
awscli/examples/eks/list-tags-for-resource.rst,sha256=_u6k-mE7aQmhNbivJWhVb0FPhZ_hYwiV9TU6z80CfqU,4290
|
2524
2538
|
awscli/examples/eks/list-update.rst,sha256=vyiU7XA1gutHLMbXhQyDv1m2Qb9hGZCQmsRMrS_HwOw,1295
|
2525
2539
|
awscli/examples/eks/list-updates.rst,sha256=YwqUUuTOLzkzncmVg1J2YpKLx5PyZN0t7esNfMNQQcA,289
|
2526
2540
|
awscli/examples/eks/register-cluster.rst,sha256=9ficF83hyhIVbJStQAHzVVsFXMfobCc1lNGVa2F6x_4,2530
|
2527
2541
|
awscli/examples/eks/tag-resource.rst,sha256=dul6fX4819LhCc2MaZv-SfKBxBTvFBdnFqrfRystlYI,869
|
2528
2542
|
awscli/examples/eks/untag-resource.rst,sha256=I28RzcJVA8H-J7R_7PTAxj0YtI9QDHo-hVv1awM_lDk,863
|
2543
|
+
awscli/examples/eks/update-access-entry.rst,sha256=khv_0jDlNWUADzglss0EqSXt_IqSQifGM64tKKb87f8,1177
|
2529
2544
|
awscli/examples/eks/update-addon.rst,sha256=nwU3elxdhsUdlUFfa8LV1vgjAMpxFAM7sOXIubnEhuU,8524
|
2530
2545
|
awscli/examples/eks/update-cluster-config.rst,sha256=BUv5hWQPB-ZBCjEqr4_R8Zj7JGKKVs_O8Yuu1nBiQ0I,1619
|
2531
2546
|
awscli/examples/eks/update-cluster-version.rst,sha256=JUXS0GrGdtTbjOT9N_lUDhd1fyXuEm8yKe6KjmHArX4,1077
|
2532
2547
|
awscli/examples/eks/update-kubeconfig.rst,sha256=McL_9xA3KST54Y7-AylWlEl1jlOG5n1Vid_JyEBoRww,4620
|
2533
2548
|
awscli/examples/eks/update-nodegroup-config.rst,sha256=2HTWv17VZbq7wnwZlCu9h0cSmlt9C4o7LE0dUTW08D0,6583
|
2534
2549
|
awscli/examples/eks/update-nodegroup-version.rst,sha256=ZJwGzWjOZFDWu8GewJwYnLvS4yTHq0CHMU4BFDIqaoI,2459
|
2550
|
+
awscli/examples/eks/update-pod-identity-association.rst,sha256=X3uvXP7487DzmeSq_6Fa31bA-lhB4x0DO_zvP2RwFvc,1408
|
2535
2551
|
awscli/examples/eks/wait.rst,sha256=q4u9o0yZM6gGk7BJ3qf4uNw1ElDDqzdr4npp5vtfAAE,354
|
2536
2552
|
awscli/examples/eks/update-kubeconfig/_description.rst,sha256=chkZW0gv_iguCI9_sdFqvP1gIw7YUBt6YsLaHwlF3aI,1781
|
2537
2553
|
awscli/examples/eks/wait/addon-active.rst,sha256=twG4MgC3yvkSURSb47ZcfhOH8clNDmbky4eRNaYeZF4,409
|
@@ -6164,13 +6180,13 @@ awscli/topics/return-codes.rst,sha256=d9lpNFZwD75IiYcDEADQzu-4QiR8P28UPHkrNwPV5J
|
|
6164
6180
|
awscli/topics/s3-config.rst,sha256=5EIVd4ggLBHtzjtHFvQp9hY415yMGZiG7S_rO9qy2t0,11663
|
6165
6181
|
awscli/topics/s3-faq.rst,sha256=9qO0HFI6F9hx1wVEUDl8Jy6yoCUd9zbtv-Z0Re4dsiw,2934
|
6166
6182
|
awscli/topics/topic-tags.json,sha256=6lUSrs3FKCZNRSQMnjcXNgWyRNGjZIeur1988a4IO5o,1577
|
6167
|
-
awscli-1.41.
|
6168
|
-
awscli-1.41.
|
6169
|
-
awscli-1.41.
|
6170
|
-
awscli-1.41.
|
6171
|
-
awscli-1.41.
|
6172
|
-
awscli-1.41.
|
6173
|
-
awscli-1.41.
|
6174
|
-
awscli-1.41.
|
6175
|
-
awscli-1.41.
|
6176
|
-
awscli-1.41.
|
6183
|
+
awscli-1.41.8.data/scripts/aws,sha256=r24FExgs0-JjILTQ3XZAqXBYE4SV6UMTtALkLGAj86g,805
|
6184
|
+
awscli-1.41.8.data/scripts/aws.cmd,sha256=s46DkC6LNgX63CIkzxxbPnFMJ6DRDBkvc88GnWa8Pvg,1432
|
6185
|
+
awscli-1.41.8.data/scripts/aws_bash_completer,sha256=RRpoEGJRagRzyHZKZZOwpltuVYv2EoiZsdXhmyWPZ54,204
|
6186
|
+
awscli-1.41.8.data/scripts/aws_completer,sha256=oC9kuMDlWE47dWk_4xjPde2PQvN-M0vND0J4YSLabVQ,1126
|
6187
|
+
awscli-1.41.8.data/scripts/aws_zsh_completer.sh,sha256=Qm6Z8ejNAMzpJjaT0pzqxbSDT2zxdmzVe5haRA7qLoc,1808
|
6188
|
+
awscli-1.41.8.dist-info/LICENSE.txt,sha256=o5XhFlwu0OK_BBrijlKCRa7dQAm36UrUB3gCV_cEr8E,549
|
6189
|
+
awscli-1.41.8.dist-info/METADATA,sha256=-QtVRcCujJR9POi_YK-j28Lj86AkuMrl_jC6aqS-LfA,11104
|
6190
|
+
awscli-1.41.8.dist-info/WHEEL,sha256=GV9aMThwP_4oNCtvEC2ec3qUYutgWeAzklro_0m4WJQ,91
|
6191
|
+
awscli-1.41.8.dist-info/top_level.txt,sha256=vt9wXFr1_nGYK6abhJgt6zY3fULe4JSZedm_5XOM9S0,7
|
6192
|
+
awscli-1.41.8.dist-info/RECORD,,
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|