awscli 1.41.7__py3-none-any.whl → 1.41.9__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/clidriver.py +3 -2
  3. awscli/customizations/cloudformation/deploy.py +5 -4
  4. awscli/customizations/cloudformation/package.py +3 -2
  5. awscli/customizations/cloudfront.py +3 -1
  6. awscli/customizations/cloudtrail/subscribe.py +5 -5
  7. awscli/customizations/cloudtrail/validation.py +6 -6
  8. awscli/customizations/codedeploy/deregister.py +5 -2
  9. awscli/customizations/codedeploy/push.py +5 -3
  10. awscli/customizations/codedeploy/register.py +5 -2
  11. awscli/customizations/codedeploy/systems.py +3 -1
  12. awscli/customizations/configservice/getstatus.py +3 -3
  13. awscli/customizations/datapipeline/__init__.py +4 -2
  14. awscli/customizations/datapipeline/createdefaultroles.py +4 -2
  15. awscli/customizations/dlm/createdefaultrole.py +4 -2
  16. awscli/customizations/eks/get_token.py +3 -2
  17. awscli/customizations/eks/update_kubeconfig.py +3 -2
  18. awscli/customizations/gamelift/getlog.py +3 -2
  19. awscli/customizations/gamelift/uploadbuild.py +6 -4
  20. awscli/customizations/logs/startlivetail.py +3 -3
  21. awscli/customizations/rds.py +3 -1
  22. awscli/customizations/removals.py +2 -0
  23. awscli/customizations/utils.py +2 -1
  24. awscli/customizations/waiters.py +3 -2
  25. awscli/examples/eks/associate-access-policy.rst +29 -0
  26. awscli/examples/eks/create-access-entry.rst +54 -0
  27. awscli/examples/eks/create-pod-identity-association.rst +59 -0
  28. awscli/examples/eks/delete-access-entry.rst +11 -0
  29. awscli/examples/eks/delete-pod-identity-association.rst +28 -0
  30. awscli/examples/eks/describe-access-entry.rst +25 -0
  31. awscli/examples/eks/describe-insight.rst +36 -0
  32. awscli/examples/eks/describe-pod-identity-association.rst +28 -0
  33. awscli/examples/eks/disassociate-access-policy.rst +12 -0
  34. awscli/examples/eks/list-access-entries.rst +19 -0
  35. awscli/examples/eks/list-access-policies.rst +90 -0
  36. awscli/examples/eks/list-associated-access-policies.rst +27 -0
  37. awscli/examples/eks/list-insights.rst +67 -0
  38. awscli/examples/eks/list-pod-identity-associations.rst +61 -0
  39. awscli/examples/eks/update-access-entry.rst +28 -0
  40. awscli/examples/eks/update-pod-identity-association.rst +29 -0
  41. awscli/testutils.py +5 -4
  42. awscli/utils.py +14 -0
  43. {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/METADATA +2 -2
  44. {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/RECORD +52 -36
  45. {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws +0 -0
  46. {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws.cmd +0 -0
  47. {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws_bash_completer +0 -0
  48. {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws_completer +0 -0
  49. {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws_zsh_completer.sh +0 -0
  50. {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/LICENSE.txt +0 -0
  51. {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/WHEEL +0 -0
  52. {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,59 @@
1
+ **Example 1: To create an EKS Pod Identity association in EKS cluster**
2
+
3
+ The following ``create-pod-identity-association`` example creates an EKS Pod Identity association between a service account in the EKS cluster and an IAM role. ::
4
+
5
+ aws eks create-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --namespace default \
8
+ --service-account default \
9
+ --role-arn arn:aws:iam::111122223333:role/my-role
10
+
11
+ Output::
12
+
13
+ {
14
+ "association": {
15
+ "clusterName": "eks-customer",
16
+ "namespace": "default",
17
+ "serviceAccount": "default",
18
+ "roleArn": "arn:aws:iam::111122223333:role/my-role",
19
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-8mvwvh57cu74mgcst",
20
+ "associationId": "a-8mvwvh57cu74mgcst",
21
+ "tags": {},
22
+ "createdAt": "2025-05-24T19:40:13.961000-05:00",
23
+ "modifiedAt": "2025-05-24T19:40:13.961000-05:00"
24
+ }
25
+ }
26
+
27
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
28
+
29
+ **Example 2: To create an EKS Pod Identity association in EKS cluster with tags**
30
+
31
+ The following ``create-pod-identity-association`` creates an EKS Pod Identity association between a service account and an IAM role in the EKS cluster with tags. ::
32
+
33
+ aws eks create-pod-identity-association \
34
+ --cluster-name eks-customer \
35
+ --namespace default \
36
+ --service-account default \
37
+ --role-arn arn:aws:iam::111122223333:role/my-role \
38
+ --tags Key1=value1,Key2=value2
39
+
40
+ Output::
41
+
42
+ {
43
+ "association": {
44
+ "clusterName": "eks-customer",
45
+ "namespace": "default",
46
+ "serviceAccount": "default",
47
+ "roleArn": "arn:aws:iam::111122223333:role/my-role",
48
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgoda",
49
+ "associationId": "a-9njjin9gfghecgoda",
50
+ "tags": {
51
+ "Key2": "value2",
52
+ "Key1": "value1"
53
+ },
54
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
55
+ "modifiedAt": "2025-05-24T19:52:14.135000-05:00"
56
+ }
57
+ }
58
+
59
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,11 @@
1
+ **To delete an access entry associated with the cluster**
2
+
3
+ The following ``delete-access-entry`` deletes an access entry associated with the EKS cluster named ``eks-customer``. ::
4
+
5
+ aws eks delete-access-entry \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Delete access entries <https://docs.aws.amazon.com/eks/latest/userguide/deleting-access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,28 @@
1
+ **To delete the EKS Pod Identity association**
2
+
3
+ The following ``delete-pod-identity-association`` example deletes the EKS Pod Identity association with association ID ``a-9njjin9gfghecgocd`` from the EKS cluster named ``eks-customer``. ::
4
+
5
+ aws eks delete-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --association-id a-9njjin9gfghecgocd
8
+
9
+ Output::
10
+
11
+ {
12
+ "association": {
13
+ "clusterName": "eks-customer",
14
+ "namespace": "default",
15
+ "serviceAccount": "default",
16
+ "roleArn": "arn:aws:iam::111122223333:role/s3-role",
17
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
18
+ "associationId": "a-9njjin9gfghecgocd",
19
+ "tags": {
20
+ "Key2": "value2",
21
+ "Key1": "value1"
22
+ },
23
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
24
+ "modifiedAt": "2025-05-25T21:10:56.923000-05:00"
25
+ }
26
+ }
27
+
28
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,25 @@
1
+ **To describe the access entry for EKS cluster**
2
+
3
+ The following ``describe-access-entry`` example describes an access entry for the EKS cluster. ::
4
+
5
+ aws eks describe-access-entry \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:user/eks-admin-user
8
+
9
+ Output::
10
+
11
+ {
12
+ "accessEntry": {
13
+ "clusterName": "eks-customer",
14
+ "principalArn": "arn:aws:iam::111122223333:user/eks-admin-user",
15
+ "kubernetesGroups": [],
16
+ "accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/user/111122223333/eks-admin-user/0acb1bc6-cb0a-ede6-11ae-a6506e3d36p0",
17
+ "createdAt": "2025-04-14T22:45:48.097000-05:00",
18
+ "modifiedAt": "2025-04-14T22:45:48.097000-05:00",
19
+ "tags": {},
20
+ "username": "arn:aws:iam::111122223333:user/eks-admin-user",
21
+ "type": "STANDARD"
22
+ }
23
+ }
24
+
25
+ For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,36 @@
1
+ **To get the details of an insight for an EKS cluster using its ID**
2
+
3
+ The following ``describe-insight`` example returns the details about the insight specified using the cluster name and insight ID. ::
4
+
5
+ aws eks describe-insight \
6
+ --cluster-name eks-customer \
7
+ --id 38ea7a64-a14f-4e0e-95c7-8dbcab3c3623
8
+
9
+ Output::
10
+
11
+ {
12
+ "insight": {
13
+ "id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3623",
14
+ "name": "Kubelet version skew",
15
+ "category": "UPGRADE_READINESS",
16
+ "kubernetesVersion": "1.33",
17
+ "lastRefreshTime": "2025-05-24T11:22:50-05:00",
18
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
19
+ "description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
20
+ "insightStatus": {
21
+ "status": "PASSING",
22
+ "reason": "Node kubelet versions match the cluster control plane version."
23
+ },
24
+ "recommendation": "Upgrade your worker nodes to match the Kubernetes version of your cluster control plane.",
25
+ "additionalInfo": {
26
+ "Kubelet version skew policy": "https://kubernetes.io/releases/version-skew-policy/#kubelet",
27
+ "Updating a managed node group": "https://docs.aws.amazon.com/eks/latest/userguide/update-managed-node-group.html"
28
+ },
29
+ "resources": [],
30
+ "categorySpecificSummary": {
31
+ "deprecationDetails": []
32
+ }
33
+ }
34
+ }
35
+
36
+ For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,28 @@
1
+ **To provide the details about Pod Identity association**
2
+
3
+ The following ``describe-pod-identity-association`` example describes a Pod Identity association in the EKS cluster. ::
4
+
5
+ aws eks describe-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --association-id a-9njjin9gfghecgocd
8
+
9
+ Output::
10
+
11
+ {
12
+ "association": {
13
+ "clusterName": "eks-customer",
14
+ "namespace": "default",
15
+ "serviceAccount": "default",
16
+ "roleArn": "arn:aws:iam::111122223333:role/my-role",
17
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
18
+ "associationId": "a-9njjin9gfghecgocd",
19
+ "tags": {
20
+ "Key2": "value2",
21
+ "Key1": "value1"
22
+ },
23
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
24
+ "modifiedAt": "2025-05-24T19:52:14.135000-05:00"
25
+ }
26
+ }
27
+
28
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,12 @@
1
+ **To disassociate the access policy from an access entry**
2
+
3
+ The following ``disassociate-access-policy`` removes the access policy associated with the access entry. ::
4
+
5
+ aws eks disassociate-access-policy \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin \
8
+ --policy-arn arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy
9
+
10
+ This command produces no output.
11
+
12
+ For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,19 @@
1
+ **To list the access entries for an EKS cluster**
2
+
3
+ The following ``list-access-entries`` returns the list of access entries associated with the EKS cluster ``eks-customer``. ::
4
+
5
+ aws eks list-access-entries \
6
+ --cluster-name eks-customer
7
+
8
+ Output::
9
+
10
+ {
11
+ "accessEntries": [
12
+ "arn:aws:iam::111122223333:role/Admin",
13
+ "arn:aws:iam::111122223333:role/admin-test-ip",
14
+ "arn:aws:iam::111122223333:role/assume-worker-node-role",
15
+ "arn:aws:iam::111122223333:user/eks-admin-user"
16
+ ]
17
+ }
18
+
19
+ For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,90 @@
1
+ **To list all available access policies**
2
+
3
+ This ``list-access-policies`` example returns the list of all available access policies. ::
4
+
5
+ aws eks list-access-policies
6
+
7
+ Output::
8
+
9
+ {
10
+ "accessPolicies": [
11
+ {
12
+ "name": "AmazonEKSAdminPolicy",
13
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy"
14
+ },
15
+ {
16
+ "name": "AmazonEKSAdminViewPolicy",
17
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminViewPolicy"
18
+ },
19
+ {
20
+ "name": "AmazonEKSAutoNodePolicy",
21
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAutoNodePolicy"
22
+ },
23
+ {
24
+ "name": "AmazonEKSBlockStorageClusterPolicy",
25
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStorageClusterPolicy"
26
+ },
27
+ {
28
+ "name": "AmazonEKSBlockStoragePolicy",
29
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStoragePolicy"
30
+ },
31
+ {
32
+ "name": "AmazonEKSClusterAdminPolicy",
33
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
34
+ },
35
+ {
36
+ "name": "AmazonEKSComputeClusterPolicy",
37
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputeClusterPolicy"
38
+ },
39
+ {
40
+ "name": "AmazonEKSComputePolicy",
41
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputePolicy"
42
+ },
43
+ {
44
+ "name": "AmazonEKSEditPolicy",
45
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy"
46
+ },
47
+ {
48
+ "name": "AmazonEKSHybridPolicy",
49
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSHybridPolicy"
50
+ },
51
+ {
52
+ "name": "AmazonEKSLoadBalancingClusterPolicy",
53
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingClusterPolicy"
54
+ },
55
+ {
56
+ "name": "AmazonEKSLoadBalancingPolicy",
57
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingPolicy"
58
+ },
59
+ {
60
+ "name": "AmazonEKSNetworkingClusterPolicy",
61
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingClusterPolicy"
62
+ },
63
+ {
64
+ "name": "AmazonEKSNetworkingPolicy",
65
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingPolicy"
66
+ },
67
+ {
68
+ "name": "AmazonEKSViewPolicy",
69
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"
70
+ },
71
+ {
72
+ "name": "AmazonEMRJobPolicy",
73
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEMRJobPolicy"
74
+ },
75
+ {
76
+ "name": "AmazonSagemakerHyperpodClusterPolicy",
77
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodClusterPolicy"
78
+ },
79
+ {
80
+ "name": "AmazonSagemakerHyperpodControllerPolicy",
81
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodControllerPolicy"
82
+ },
83
+ {
84
+ "name": "AmazonSagemakerHyperpodSystemNamespacePolicy",
85
+ "arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodSystemNamespacePolicy"
86
+ }
87
+ ]
88
+ }
89
+
90
+ For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,27 @@
1
+ **To list the access policies associated with an access entry**
2
+
3
+ The following ``list-associated-access-policies`` example returns the list of access policies associated with an access entry in the EKS cluster. ::
4
+
5
+ aws eks list-associated-access-policies \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin
8
+
9
+ Output::
10
+
11
+ {
12
+ "associatedAccessPolicies": [
13
+ {
14
+ "policyArn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy",
15
+ "accessScope": {
16
+ "type": "cluster",
17
+ "namespaces": []
18
+ },
19
+ "associatedAt": "2025-05-24T17:26:22.935000-05:00",
20
+ "modifiedAt": "2025-05-24T17:26:22.935000-05:00"
21
+ }
22
+ ],
23
+ "clusterName": "eks-customer",
24
+ "principalArn": "arn:aws:iam::111122223333:role/Admin"
25
+ }
26
+
27
+ For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,67 @@
1
+ **To list all insights for the specified cluster**
2
+
3
+ The following ``list-insights`` example returns the list of all insights checked against the specified cluster. ::
4
+
5
+ aws eks list-insights \
6
+ --cluster-name eks-customer
7
+
8
+ Output::
9
+
10
+ {
11
+ "insights": [
12
+ {
13
+ "id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3616",
14
+ "name": "Kubelet version skew",
15
+ "category": "UPGRADE_READINESS",
16
+ "kubernetesVersion": "1.33",
17
+ "lastRefreshTime": "2025-05-24T11:22:50-05:00",
18
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
19
+ "description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
20
+ "insightStatus": {
21
+ "status": "PASSING",
22
+ "reason": "Node kubelet versions match the cluster control plane version."
23
+ }
24
+ },
25
+ {
26
+ "id": "9cd91472-f99c-45a9-b7d7-54d4900dee23",
27
+ "name": "EKS add-on version compatibility",
28
+ "category": "UPGRADE_READINESS",
29
+ "kubernetesVersion": "1.33",
30
+ "lastRefreshTime": "2025-05-24T11:22:59-05:00",
31
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
32
+ "description": "Checks version of installed EKS add-ons to ensure they are compatible with the next version of Kubernetes. ",
33
+ "insightStatus": {
34
+ "status": "PASSING",
35
+ "reason": "All installed EKS add-on versions are compatible with next Kubernetes version."
36
+ }
37
+ },
38
+ {
39
+ "id": "0deb269d-b1e1-458c-a2b4-7a57f940c875",
40
+ "name": "Cluster health issues",
41
+ "category": "UPGRADE_READINESS",
42
+ "kubernetesVersion": "1.33",
43
+ "lastRefreshTime": "2025-05-24T11:22:59-05:00",
44
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
45
+ "description": "Checks for any cluster health issues that prevent successful upgrade to the next Kubernetes version on EKS.",
46
+ "insightStatus": {
47
+ "status": "PASSING",
48
+ "reason": "No cluster health issues detected."
49
+ }
50
+ },
51
+ {
52
+ "id": "214fa274-344f-420b-812a-5049ce72c9ww",
53
+ "name": "kube-proxy version skew",
54
+ "category": "UPGRADE_READINESS",
55
+ "kubernetesVersion": "1.33",
56
+ "lastRefreshTime": "2025-05-24T11:22:50-05:00",
57
+ "lastTransitionTime": "2025-05-24T11:22:50-05:00",
58
+ "description": "Checks version of kube-proxy in cluster to see if upgrade would cause noncompliance with supported Kubernetes kube-proxy version skew policy.",
59
+ "insightStatus": {
60
+ "status": "PASSING",
61
+ "reason": "kube-proxy versions match the cluster control plane version."
62
+ }
63
+ }
64
+ ]
65
+ }
66
+
67
+ For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,61 @@
1
+ **Example 1: To list the Pod Identity associations in an EKS cluster**
2
+
3
+ The following ``list-pod-identity-associations`` returns the list of Pod Identity associations associated with the EKS cluster named ``eks-customer`` in all namespaces and service accounts. ::
4
+
5
+ aws eks list-pod-identity-associations \
6
+ --cluster-name eks-customer
7
+
8
+ Output::
9
+
10
+ {
11
+ "associations": [
12
+ {
13
+ "clusterName": "eks-customer",
14
+ "namespace": "default",
15
+ "serviceAccount": "default",
16
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
17
+ "associationId": "a-9njjin9gfghecgocd"
18
+ },
19
+ {
20
+ "clusterName": "eks-customer",
21
+ "namespace": "kube-system",
22
+ "serviceAccount": "eks-customer",
23
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
24
+ "associationId": "a-dvtacahdvjn01ffbc"
25
+ },
26
+ {
27
+ "clusterName": "eks-customer",
28
+ "namespace": "kube-system",
29
+ "serviceAccount": "coredns",
30
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-yrpsdroc4ei7k6xps",
31
+ "associationId": "a-yrpsdroc4ei7k6xps"
32
+ }
33
+ ]
34
+ }
35
+
36
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
37
+
38
+ **Example 2: To list the Pod Identity associations in an EKS cluster based on namespace and service account**
39
+
40
+ The following ``list-pod-identity-associations`` returns the list of Pod Identity associations in the EKS cluster based on namespace and service account. ::
41
+
42
+ aws eks list-pod-identity-associations \
43
+ --cluster-name eks-customer \
44
+ --namespace kube-system \
45
+ --service-account eks-customer
46
+
47
+ Output::
48
+
49
+ {
50
+ "associations": [
51
+ {
52
+ "clusterName": "eks-customer",
53
+ "namespace": "kube-system",
54
+ "serviceAccount": "eks-customer",
55
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
56
+ "associationId": "a-dvtacahdvjn01ffbc"
57
+ }
58
+ ]
59
+ }
60
+
61
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,28 @@
1
+ **To update an access entry for an EKS cluster**
2
+
3
+ The following ``update-access-entry`` updates an access entry for the EKS cluster by adding the Kubernetes group ``tester``. ::
4
+
5
+ aws eks update-access-entry \
6
+ --cluster-name eks-customer \
7
+ --principal-arn arn:aws:iam::111122223333:role/Admin \
8
+ --kubernetes-groups tester
9
+
10
+ Output::
11
+
12
+ {
13
+ "accessEntry": {
14
+ "clusterName": "eks-customer",
15
+ "principalArn": "arn:aws:iam::111122223333:role/Admin",
16
+ "kubernetesGroups": [
17
+ "tester"
18
+ ],
19
+ "accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/role/111122223333/Admin/d2cb8183-d6ec-b82a-d967-eca21902a4b4",
20
+ "createdAt": "2025-05-24T11:02:04.432000-05:00",
21
+ "modifiedAt": "2025-05-24T17:08:01.608000-05:00",
22
+ "tags": {},
23
+ "username": "arn:aws:sts::111122223333:assumed-role/Admin/{{SessionName}}",
24
+ "type": "STANDARD"
25
+ }
26
+ }
27
+
28
+ For more information, see `Update access entries <https://docs.aws.amazon.com/eks/latest/userguide/updating-access-entries.html>`__ in the *Amazon EKS User Guide*.
@@ -0,0 +1,29 @@
1
+ **To update the EKS Pod Identity association**
2
+
3
+ The following ``update-pod-identity-association`` example updates an EKS Pod Identity association by changing the associated IAM role from ``arn:aws:iam::111122223333:role/my-role`` to ``arn:aws:iam::111122223333:role/s3-role`` for association ID ``a-9njjin9gfghecgocd``. This API only allows updating the associated IAM role. ::
4
+
5
+ aws eks update-pod-identity-association \
6
+ --cluster-name eks-customer \
7
+ --association-id a-9njjin9gfghecgocd \
8
+ --role-arn arn:aws:iam::111122223333:role/s3-role
9
+
10
+ Output::
11
+
12
+ {
13
+ "association": {
14
+ "clusterName": "eks-customer",
15
+ "namespace": "default",
16
+ "serviceAccount": "default",
17
+ "roleArn": "arn:aws:iam::111122223333:role/s3-role",
18
+ "associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
19
+ "associationId": "a-9njjin9gfghecgocd",
20
+ "tags": {
21
+ "Key2": "value2",
22
+ "Key1": "value1"
23
+ },
24
+ "createdAt": "2025-05-24T19:52:14.135000-05:00",
25
+ "modifiedAt": "2025-05-25T21:01:53.120000-05:00"
26
+ }
27
+ }
28
+
29
+ For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
awscli/testutils.py CHANGED
@@ -43,6 +43,7 @@ from botocore.exceptions import ClientError, WaiterError
43
43
 
44
44
  import awscli.clidriver
45
45
  from awscli.compat import BytesIO, StringIO
46
+ from awscli.utils import create_nested_client
46
47
 
47
48
  _LOADER = botocore.loaders.Loader()
48
49
  INTEG_LOG = logging.getLogger('awscli.tests.integration')
@@ -143,7 +144,7 @@ def create_bucket(session, name=None, region=None):
143
144
  """
144
145
  if not region:
145
146
  region = 'us-west-2'
146
- client = session.create_client('s3', region_name=region)
147
+ client = create_nested_client(session, 's3', region_name=region)
147
148
  if name:
148
149
  bucket_name = name
149
150
  else:
@@ -172,7 +173,7 @@ def create_dir_bucket(session, name=None, location=None):
172
173
  if not location:
173
174
  location = ('us-west-2', 'usw2-az1')
174
175
  region, az = location
175
- client = session.create_client('s3', region_name=region)
176
+ client = create_nested_client(session, 's3', region_name=region)
176
177
  if name:
177
178
  bucket_name = name
178
179
  else:
@@ -778,7 +779,7 @@ class BaseS3CLICommand(unittest.TestCase):
778
779
  self.session = botocore.session.get_session()
779
780
  self.regions = {}
780
781
  self.region = 'us-west-2'
781
- self.client = self.session.create_client('s3', region_name=self.region)
782
+ self.client = create_nested_client(self.session, 's3', region_name=self.region)
782
783
  self.extra_setup()
783
784
 
784
785
  def extra_setup(self):
@@ -799,7 +800,7 @@ class BaseS3CLICommand(unittest.TestCase):
799
800
 
800
801
  def create_client_for_bucket(self, bucket_name):
801
802
  region = self.regions.get(bucket_name, self.region)
802
- client = self.session.create_client('s3', region_name=region)
803
+ client = create_nested_client(self.session, 's3', region_name=region)
803
804
  return client
804
805
 
805
806
  def assert_key_contents_equal(self, bucket, key, expected_contents):
awscli/utils.py CHANGED
@@ -311,3 +311,17 @@ class ShapeRecordingVisitor(BaseShapeVisitor):
311
311
 
312
312
  def visit_shape(self, shape):
313
313
  self.visited.append(shape)
314
+
315
+ # NOTE: The following interfaces are considered private and are subject
316
+ # to abrupt breaking changes. Please do not use them directly.
317
+
318
+ try:
319
+ from botocore.utils import create_nested_client as create_client
320
+ except ImportError:
321
+
322
+ def create_client(session, service_name, **kwargs):
323
+ return session.create_client(service_name, **kwargs)
324
+
325
+
326
+ def create_nested_client(session, service_name, **kwargs):
327
+ return create_client(session, service_name, **kwargs)
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: awscli
3
- Version: 1.41.7
3
+ Version: 1.41.9
4
4
  Summary: Universal Command Line Environment for AWS.
5
5
  Home-page: http://aws.amazon.com/cli/
6
6
  Author: Amazon Web Services
@@ -23,7 +23,7 @@ Classifier: Programming Language :: Python :: 3.12
23
23
  Classifier: Programming Language :: Python :: 3.13
24
24
  Requires-Python: >= 3.9
25
25
  License-File: LICENSE.txt
26
- Requires-Dist: botocore (==1.39.7)
26
+ Requires-Dist: botocore (==1.39.9)
27
27
  Requires-Dist: docutils (<=0.19,>=0.18.1)
28
28
  Requires-Dist: s3transfer (<0.14.0,>=0.13.0)
29
29
  Requires-Dist: PyYAML (<6.1,>=3.10)