awscli 1.41.7__py3-none-any.whl → 1.41.9__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- awscli/__init__.py +1 -1
- awscli/clidriver.py +3 -2
- awscli/customizations/cloudformation/deploy.py +5 -4
- awscli/customizations/cloudformation/package.py +3 -2
- awscli/customizations/cloudfront.py +3 -1
- awscli/customizations/cloudtrail/subscribe.py +5 -5
- awscli/customizations/cloudtrail/validation.py +6 -6
- awscli/customizations/codedeploy/deregister.py +5 -2
- awscli/customizations/codedeploy/push.py +5 -3
- awscli/customizations/codedeploy/register.py +5 -2
- awscli/customizations/codedeploy/systems.py +3 -1
- awscli/customizations/configservice/getstatus.py +3 -3
- awscli/customizations/datapipeline/__init__.py +4 -2
- awscli/customizations/datapipeline/createdefaultroles.py +4 -2
- awscli/customizations/dlm/createdefaultrole.py +4 -2
- awscli/customizations/eks/get_token.py +3 -2
- awscli/customizations/eks/update_kubeconfig.py +3 -2
- awscli/customizations/gamelift/getlog.py +3 -2
- awscli/customizations/gamelift/uploadbuild.py +6 -4
- awscli/customizations/logs/startlivetail.py +3 -3
- awscli/customizations/rds.py +3 -1
- awscli/customizations/removals.py +2 -0
- awscli/customizations/utils.py +2 -1
- awscli/customizations/waiters.py +3 -2
- awscli/examples/eks/associate-access-policy.rst +29 -0
- awscli/examples/eks/create-access-entry.rst +54 -0
- awscli/examples/eks/create-pod-identity-association.rst +59 -0
- awscli/examples/eks/delete-access-entry.rst +11 -0
- awscli/examples/eks/delete-pod-identity-association.rst +28 -0
- awscli/examples/eks/describe-access-entry.rst +25 -0
- awscli/examples/eks/describe-insight.rst +36 -0
- awscli/examples/eks/describe-pod-identity-association.rst +28 -0
- awscli/examples/eks/disassociate-access-policy.rst +12 -0
- awscli/examples/eks/list-access-entries.rst +19 -0
- awscli/examples/eks/list-access-policies.rst +90 -0
- awscli/examples/eks/list-associated-access-policies.rst +27 -0
- awscli/examples/eks/list-insights.rst +67 -0
- awscli/examples/eks/list-pod-identity-associations.rst +61 -0
- awscli/examples/eks/update-access-entry.rst +28 -0
- awscli/examples/eks/update-pod-identity-association.rst +29 -0
- awscli/testutils.py +5 -4
- awscli/utils.py +14 -0
- {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/METADATA +2 -2
- {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/RECORD +52 -36
- {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws +0 -0
- {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws.cmd +0 -0
- {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws_completer +0 -0
- {awscli-1.41.7.data → awscli-1.41.9.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/LICENSE.txt +0 -0
- {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/WHEEL +0 -0
- {awscli-1.41.7.dist-info → awscli-1.41.9.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,59 @@
|
|
1
|
+
**Example 1: To create an EKS Pod Identity association in EKS cluster**
|
2
|
+
|
3
|
+
The following ``create-pod-identity-association`` example creates an EKS Pod Identity association between a service account in the EKS cluster and an IAM role. ::
|
4
|
+
|
5
|
+
aws eks create-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--namespace default \
|
8
|
+
--service-account default \
|
9
|
+
--role-arn arn:aws:iam::111122223333:role/my-role
|
10
|
+
|
11
|
+
Output::
|
12
|
+
|
13
|
+
{
|
14
|
+
"association": {
|
15
|
+
"clusterName": "eks-customer",
|
16
|
+
"namespace": "default",
|
17
|
+
"serviceAccount": "default",
|
18
|
+
"roleArn": "arn:aws:iam::111122223333:role/my-role",
|
19
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-8mvwvh57cu74mgcst",
|
20
|
+
"associationId": "a-8mvwvh57cu74mgcst",
|
21
|
+
"tags": {},
|
22
|
+
"createdAt": "2025-05-24T19:40:13.961000-05:00",
|
23
|
+
"modifiedAt": "2025-05-24T19:40:13.961000-05:00"
|
24
|
+
}
|
25
|
+
}
|
26
|
+
|
27
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
28
|
+
|
29
|
+
**Example 2: To create an EKS Pod Identity association in EKS cluster with tags**
|
30
|
+
|
31
|
+
The following ``create-pod-identity-association`` creates an EKS Pod Identity association between a service account and an IAM role in the EKS cluster with tags. ::
|
32
|
+
|
33
|
+
aws eks create-pod-identity-association \
|
34
|
+
--cluster-name eks-customer \
|
35
|
+
--namespace default \
|
36
|
+
--service-account default \
|
37
|
+
--role-arn arn:aws:iam::111122223333:role/my-role \
|
38
|
+
--tags Key1=value1,Key2=value2
|
39
|
+
|
40
|
+
Output::
|
41
|
+
|
42
|
+
{
|
43
|
+
"association": {
|
44
|
+
"clusterName": "eks-customer",
|
45
|
+
"namespace": "default",
|
46
|
+
"serviceAccount": "default",
|
47
|
+
"roleArn": "arn:aws:iam::111122223333:role/my-role",
|
48
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgoda",
|
49
|
+
"associationId": "a-9njjin9gfghecgoda",
|
50
|
+
"tags": {
|
51
|
+
"Key2": "value2",
|
52
|
+
"Key1": "value1"
|
53
|
+
},
|
54
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
55
|
+
"modifiedAt": "2025-05-24T19:52:14.135000-05:00"
|
56
|
+
}
|
57
|
+
}
|
58
|
+
|
59
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,11 @@
|
|
1
|
+
**To delete an access entry associated with the cluster**
|
2
|
+
|
3
|
+
The following ``delete-access-entry`` deletes an access entry associated with the EKS cluster named ``eks-customer``. ::
|
4
|
+
|
5
|
+
aws eks delete-access-entry \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin
|
8
|
+
|
9
|
+
This command produces no output.
|
10
|
+
|
11
|
+
For more information, see `Delete access entries <https://docs.aws.amazon.com/eks/latest/userguide/deleting-access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,28 @@
|
|
1
|
+
**To delete the EKS Pod Identity association**
|
2
|
+
|
3
|
+
The following ``delete-pod-identity-association`` example deletes the EKS Pod Identity association with association ID ``a-9njjin9gfghecgocd`` from the EKS cluster named ``eks-customer``. ::
|
4
|
+
|
5
|
+
aws eks delete-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--association-id a-9njjin9gfghecgocd
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"association": {
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"namespace": "default",
|
15
|
+
"serviceAccount": "default",
|
16
|
+
"roleArn": "arn:aws:iam::111122223333:role/s3-role",
|
17
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
18
|
+
"associationId": "a-9njjin9gfghecgocd",
|
19
|
+
"tags": {
|
20
|
+
"Key2": "value2",
|
21
|
+
"Key1": "value1"
|
22
|
+
},
|
23
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
24
|
+
"modifiedAt": "2025-05-25T21:10:56.923000-05:00"
|
25
|
+
}
|
26
|
+
}
|
27
|
+
|
28
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,25 @@
|
|
1
|
+
**To describe the access entry for EKS cluster**
|
2
|
+
|
3
|
+
The following ``describe-access-entry`` example describes an access entry for the EKS cluster. ::
|
4
|
+
|
5
|
+
aws eks describe-access-entry \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:user/eks-admin-user
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"accessEntry": {
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"principalArn": "arn:aws:iam::111122223333:user/eks-admin-user",
|
15
|
+
"kubernetesGroups": [],
|
16
|
+
"accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/user/111122223333/eks-admin-user/0acb1bc6-cb0a-ede6-11ae-a6506e3d36p0",
|
17
|
+
"createdAt": "2025-04-14T22:45:48.097000-05:00",
|
18
|
+
"modifiedAt": "2025-04-14T22:45:48.097000-05:00",
|
19
|
+
"tags": {},
|
20
|
+
"username": "arn:aws:iam::111122223333:user/eks-admin-user",
|
21
|
+
"type": "STANDARD"
|
22
|
+
}
|
23
|
+
}
|
24
|
+
|
25
|
+
For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,36 @@
|
|
1
|
+
**To get the details of an insight for an EKS cluster using its ID**
|
2
|
+
|
3
|
+
The following ``describe-insight`` example returns the details about the insight specified using the cluster name and insight ID. ::
|
4
|
+
|
5
|
+
aws eks describe-insight \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--id 38ea7a64-a14f-4e0e-95c7-8dbcab3c3623
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"insight": {
|
13
|
+
"id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3623",
|
14
|
+
"name": "Kubelet version skew",
|
15
|
+
"category": "UPGRADE_READINESS",
|
16
|
+
"kubernetesVersion": "1.33",
|
17
|
+
"lastRefreshTime": "2025-05-24T11:22:50-05:00",
|
18
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
19
|
+
"description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
|
20
|
+
"insightStatus": {
|
21
|
+
"status": "PASSING",
|
22
|
+
"reason": "Node kubelet versions match the cluster control plane version."
|
23
|
+
},
|
24
|
+
"recommendation": "Upgrade your worker nodes to match the Kubernetes version of your cluster control plane.",
|
25
|
+
"additionalInfo": {
|
26
|
+
"Kubelet version skew policy": "https://kubernetes.io/releases/version-skew-policy/#kubelet",
|
27
|
+
"Updating a managed node group": "https://docs.aws.amazon.com/eks/latest/userguide/update-managed-node-group.html"
|
28
|
+
},
|
29
|
+
"resources": [],
|
30
|
+
"categorySpecificSummary": {
|
31
|
+
"deprecationDetails": []
|
32
|
+
}
|
33
|
+
}
|
34
|
+
}
|
35
|
+
|
36
|
+
For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,28 @@
|
|
1
|
+
**To provide the details about Pod Identity association**
|
2
|
+
|
3
|
+
The following ``describe-pod-identity-association`` example describes a Pod Identity association in the EKS cluster. ::
|
4
|
+
|
5
|
+
aws eks describe-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--association-id a-9njjin9gfghecgocd
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"association": {
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"namespace": "default",
|
15
|
+
"serviceAccount": "default",
|
16
|
+
"roleArn": "arn:aws:iam::111122223333:role/my-role",
|
17
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
18
|
+
"associationId": "a-9njjin9gfghecgocd",
|
19
|
+
"tags": {
|
20
|
+
"Key2": "value2",
|
21
|
+
"Key1": "value1"
|
22
|
+
},
|
23
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
24
|
+
"modifiedAt": "2025-05-24T19:52:14.135000-05:00"
|
25
|
+
}
|
26
|
+
}
|
27
|
+
|
28
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,12 @@
|
|
1
|
+
**To disassociate the access policy from an access entry**
|
2
|
+
|
3
|
+
The following ``disassociate-access-policy`` removes the access policy associated with the access entry. ::
|
4
|
+
|
5
|
+
aws eks disassociate-access-policy \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin \
|
8
|
+
--policy-arn arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy
|
9
|
+
|
10
|
+
This command produces no output.
|
11
|
+
|
12
|
+
For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,19 @@
|
|
1
|
+
**To list the access entries for an EKS cluster**
|
2
|
+
|
3
|
+
The following ``list-access-entries`` returns the list of access entries associated with the EKS cluster ``eks-customer``. ::
|
4
|
+
|
5
|
+
aws eks list-access-entries \
|
6
|
+
--cluster-name eks-customer
|
7
|
+
|
8
|
+
Output::
|
9
|
+
|
10
|
+
{
|
11
|
+
"accessEntries": [
|
12
|
+
"arn:aws:iam::111122223333:role/Admin",
|
13
|
+
"arn:aws:iam::111122223333:role/admin-test-ip",
|
14
|
+
"arn:aws:iam::111122223333:role/assume-worker-node-role",
|
15
|
+
"arn:aws:iam::111122223333:user/eks-admin-user"
|
16
|
+
]
|
17
|
+
}
|
18
|
+
|
19
|
+
For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,90 @@
|
|
1
|
+
**To list all available access policies**
|
2
|
+
|
3
|
+
This ``list-access-policies`` example returns the list of all available access policies. ::
|
4
|
+
|
5
|
+
aws eks list-access-policies
|
6
|
+
|
7
|
+
Output::
|
8
|
+
|
9
|
+
{
|
10
|
+
"accessPolicies": [
|
11
|
+
{
|
12
|
+
"name": "AmazonEKSAdminPolicy",
|
13
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy"
|
14
|
+
},
|
15
|
+
{
|
16
|
+
"name": "AmazonEKSAdminViewPolicy",
|
17
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminViewPolicy"
|
18
|
+
},
|
19
|
+
{
|
20
|
+
"name": "AmazonEKSAutoNodePolicy",
|
21
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAutoNodePolicy"
|
22
|
+
},
|
23
|
+
{
|
24
|
+
"name": "AmazonEKSBlockStorageClusterPolicy",
|
25
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStorageClusterPolicy"
|
26
|
+
},
|
27
|
+
{
|
28
|
+
"name": "AmazonEKSBlockStoragePolicy",
|
29
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSBlockStoragePolicy"
|
30
|
+
},
|
31
|
+
{
|
32
|
+
"name": "AmazonEKSClusterAdminPolicy",
|
33
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
|
34
|
+
},
|
35
|
+
{
|
36
|
+
"name": "AmazonEKSComputeClusterPolicy",
|
37
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputeClusterPolicy"
|
38
|
+
},
|
39
|
+
{
|
40
|
+
"name": "AmazonEKSComputePolicy",
|
41
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSComputePolicy"
|
42
|
+
},
|
43
|
+
{
|
44
|
+
"name": "AmazonEKSEditPolicy",
|
45
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy"
|
46
|
+
},
|
47
|
+
{
|
48
|
+
"name": "AmazonEKSHybridPolicy",
|
49
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSHybridPolicy"
|
50
|
+
},
|
51
|
+
{
|
52
|
+
"name": "AmazonEKSLoadBalancingClusterPolicy",
|
53
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingClusterPolicy"
|
54
|
+
},
|
55
|
+
{
|
56
|
+
"name": "AmazonEKSLoadBalancingPolicy",
|
57
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSLoadBalancingPolicy"
|
58
|
+
},
|
59
|
+
{
|
60
|
+
"name": "AmazonEKSNetworkingClusterPolicy",
|
61
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingClusterPolicy"
|
62
|
+
},
|
63
|
+
{
|
64
|
+
"name": "AmazonEKSNetworkingPolicy",
|
65
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSNetworkingPolicy"
|
66
|
+
},
|
67
|
+
{
|
68
|
+
"name": "AmazonEKSViewPolicy",
|
69
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"
|
70
|
+
},
|
71
|
+
{
|
72
|
+
"name": "AmazonEMRJobPolicy",
|
73
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEMRJobPolicy"
|
74
|
+
},
|
75
|
+
{
|
76
|
+
"name": "AmazonSagemakerHyperpodClusterPolicy",
|
77
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodClusterPolicy"
|
78
|
+
},
|
79
|
+
{
|
80
|
+
"name": "AmazonSagemakerHyperpodControllerPolicy",
|
81
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodControllerPolicy"
|
82
|
+
},
|
83
|
+
{
|
84
|
+
"name": "AmazonSagemakerHyperpodSystemNamespacePolicy",
|
85
|
+
"arn": "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodSystemNamespacePolicy"
|
86
|
+
}
|
87
|
+
]
|
88
|
+
}
|
89
|
+
|
90
|
+
For more information, see `Associate access policies with access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-policies.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,27 @@
|
|
1
|
+
**To list the access policies associated with an access entry**
|
2
|
+
|
3
|
+
The following ``list-associated-access-policies`` example returns the list of access policies associated with an access entry in the EKS cluster. ::
|
4
|
+
|
5
|
+
aws eks list-associated-access-policies \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin
|
8
|
+
|
9
|
+
Output::
|
10
|
+
|
11
|
+
{
|
12
|
+
"associatedAccessPolicies": [
|
13
|
+
{
|
14
|
+
"policyArn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy",
|
15
|
+
"accessScope": {
|
16
|
+
"type": "cluster",
|
17
|
+
"namespaces": []
|
18
|
+
},
|
19
|
+
"associatedAt": "2025-05-24T17:26:22.935000-05:00",
|
20
|
+
"modifiedAt": "2025-05-24T17:26:22.935000-05:00"
|
21
|
+
}
|
22
|
+
],
|
23
|
+
"clusterName": "eks-customer",
|
24
|
+
"principalArn": "arn:aws:iam::111122223333:role/Admin"
|
25
|
+
}
|
26
|
+
|
27
|
+
For more information, see `Grant IAM users access to Kubernetes with EKS access entries <https://docs.aws.amazon.com/eks/latest/userguide/access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,67 @@
|
|
1
|
+
**To list all insights for the specified cluster**
|
2
|
+
|
3
|
+
The following ``list-insights`` example returns the list of all insights checked against the specified cluster. ::
|
4
|
+
|
5
|
+
aws eks list-insights \
|
6
|
+
--cluster-name eks-customer
|
7
|
+
|
8
|
+
Output::
|
9
|
+
|
10
|
+
{
|
11
|
+
"insights": [
|
12
|
+
{
|
13
|
+
"id": "38ea7a64-a14f-4e0e-95c7-8dbcab3c3616",
|
14
|
+
"name": "Kubelet version skew",
|
15
|
+
"category": "UPGRADE_READINESS",
|
16
|
+
"kubernetesVersion": "1.33",
|
17
|
+
"lastRefreshTime": "2025-05-24T11:22:50-05:00",
|
18
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
19
|
+
"description": "Checks for kubelet versions of worker nodes in the cluster to see if upgrade would cause noncompliance with supported Kubernetes kubelet version skew policy.",
|
20
|
+
"insightStatus": {
|
21
|
+
"status": "PASSING",
|
22
|
+
"reason": "Node kubelet versions match the cluster control plane version."
|
23
|
+
}
|
24
|
+
},
|
25
|
+
{
|
26
|
+
"id": "9cd91472-f99c-45a9-b7d7-54d4900dee23",
|
27
|
+
"name": "EKS add-on version compatibility",
|
28
|
+
"category": "UPGRADE_READINESS",
|
29
|
+
"kubernetesVersion": "1.33",
|
30
|
+
"lastRefreshTime": "2025-05-24T11:22:59-05:00",
|
31
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
32
|
+
"description": "Checks version of installed EKS add-ons to ensure they are compatible with the next version of Kubernetes. ",
|
33
|
+
"insightStatus": {
|
34
|
+
"status": "PASSING",
|
35
|
+
"reason": "All installed EKS add-on versions are compatible with next Kubernetes version."
|
36
|
+
}
|
37
|
+
},
|
38
|
+
{
|
39
|
+
"id": "0deb269d-b1e1-458c-a2b4-7a57f940c875",
|
40
|
+
"name": "Cluster health issues",
|
41
|
+
"category": "UPGRADE_READINESS",
|
42
|
+
"kubernetesVersion": "1.33",
|
43
|
+
"lastRefreshTime": "2025-05-24T11:22:59-05:00",
|
44
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
45
|
+
"description": "Checks for any cluster health issues that prevent successful upgrade to the next Kubernetes version on EKS.",
|
46
|
+
"insightStatus": {
|
47
|
+
"status": "PASSING",
|
48
|
+
"reason": "No cluster health issues detected."
|
49
|
+
}
|
50
|
+
},
|
51
|
+
{
|
52
|
+
"id": "214fa274-344f-420b-812a-5049ce72c9ww",
|
53
|
+
"name": "kube-proxy version skew",
|
54
|
+
"category": "UPGRADE_READINESS",
|
55
|
+
"kubernetesVersion": "1.33",
|
56
|
+
"lastRefreshTime": "2025-05-24T11:22:50-05:00",
|
57
|
+
"lastTransitionTime": "2025-05-24T11:22:50-05:00",
|
58
|
+
"description": "Checks version of kube-proxy in cluster to see if upgrade would cause noncompliance with supported Kubernetes kube-proxy version skew policy.",
|
59
|
+
"insightStatus": {
|
60
|
+
"status": "PASSING",
|
61
|
+
"reason": "kube-proxy versions match the cluster control plane version."
|
62
|
+
}
|
63
|
+
}
|
64
|
+
]
|
65
|
+
}
|
66
|
+
|
67
|
+
For more information, see `View cluster insights <https://docs.aws.amazon.com/eks/latest/userguide/view-cluster-insights.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,61 @@
|
|
1
|
+
**Example 1: To list the Pod Identity associations in an EKS cluster**
|
2
|
+
|
3
|
+
The following ``list-pod-identity-associations`` returns the list of Pod Identity associations associated with the EKS cluster named ``eks-customer`` in all namespaces and service accounts. ::
|
4
|
+
|
5
|
+
aws eks list-pod-identity-associations \
|
6
|
+
--cluster-name eks-customer
|
7
|
+
|
8
|
+
Output::
|
9
|
+
|
10
|
+
{
|
11
|
+
"associations": [
|
12
|
+
{
|
13
|
+
"clusterName": "eks-customer",
|
14
|
+
"namespace": "default",
|
15
|
+
"serviceAccount": "default",
|
16
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
17
|
+
"associationId": "a-9njjin9gfghecgocd"
|
18
|
+
},
|
19
|
+
{
|
20
|
+
"clusterName": "eks-customer",
|
21
|
+
"namespace": "kube-system",
|
22
|
+
"serviceAccount": "eks-customer",
|
23
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
|
24
|
+
"associationId": "a-dvtacahdvjn01ffbc"
|
25
|
+
},
|
26
|
+
{
|
27
|
+
"clusterName": "eks-customer",
|
28
|
+
"namespace": "kube-system",
|
29
|
+
"serviceAccount": "coredns",
|
30
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-yrpsdroc4ei7k6xps",
|
31
|
+
"associationId": "a-yrpsdroc4ei7k6xps"
|
32
|
+
}
|
33
|
+
]
|
34
|
+
}
|
35
|
+
|
36
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
37
|
+
|
38
|
+
**Example 2: To list the Pod Identity associations in an EKS cluster based on namespace and service account**
|
39
|
+
|
40
|
+
The following ``list-pod-identity-associations`` returns the list of Pod Identity associations in the EKS cluster based on namespace and service account. ::
|
41
|
+
|
42
|
+
aws eks list-pod-identity-associations \
|
43
|
+
--cluster-name eks-customer \
|
44
|
+
--namespace kube-system \
|
45
|
+
--service-account eks-customer
|
46
|
+
|
47
|
+
Output::
|
48
|
+
|
49
|
+
{
|
50
|
+
"associations": [
|
51
|
+
{
|
52
|
+
"clusterName": "eks-customer",
|
53
|
+
"namespace": "kube-system",
|
54
|
+
"serviceAccount": "eks-customer",
|
55
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-dvtacahdvjn01ffbc",
|
56
|
+
"associationId": "a-dvtacahdvjn01ffbc"
|
57
|
+
}
|
58
|
+
]
|
59
|
+
}
|
60
|
+
|
61
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,28 @@
|
|
1
|
+
**To update an access entry for an EKS cluster**
|
2
|
+
|
3
|
+
The following ``update-access-entry`` updates an access entry for the EKS cluster by adding the Kubernetes group ``tester``. ::
|
4
|
+
|
5
|
+
aws eks update-access-entry \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--principal-arn arn:aws:iam::111122223333:role/Admin \
|
8
|
+
--kubernetes-groups tester
|
9
|
+
|
10
|
+
Output::
|
11
|
+
|
12
|
+
{
|
13
|
+
"accessEntry": {
|
14
|
+
"clusterName": "eks-customer",
|
15
|
+
"principalArn": "arn:aws:iam::111122223333:role/Admin",
|
16
|
+
"kubernetesGroups": [
|
17
|
+
"tester"
|
18
|
+
],
|
19
|
+
"accessEntryArn": "arn:aws:eks:us-west-2:111122223333:access-entry/eks-customer/role/111122223333/Admin/d2cb8183-d6ec-b82a-d967-eca21902a4b4",
|
20
|
+
"createdAt": "2025-05-24T11:02:04.432000-05:00",
|
21
|
+
"modifiedAt": "2025-05-24T17:08:01.608000-05:00",
|
22
|
+
"tags": {},
|
23
|
+
"username": "arn:aws:sts::111122223333:assumed-role/Admin/{{SessionName}}",
|
24
|
+
"type": "STANDARD"
|
25
|
+
}
|
26
|
+
}
|
27
|
+
|
28
|
+
For more information, see `Update access entries <https://docs.aws.amazon.com/eks/latest/userguide/updating-access-entries.html>`__ in the *Amazon EKS User Guide*.
|
@@ -0,0 +1,29 @@
|
|
1
|
+
**To update the EKS Pod Identity association**
|
2
|
+
|
3
|
+
The following ``update-pod-identity-association`` example updates an EKS Pod Identity association by changing the associated IAM role from ``arn:aws:iam::111122223333:role/my-role`` to ``arn:aws:iam::111122223333:role/s3-role`` for association ID ``a-9njjin9gfghecgocd``. This API only allows updating the associated IAM role. ::
|
4
|
+
|
5
|
+
aws eks update-pod-identity-association \
|
6
|
+
--cluster-name eks-customer \
|
7
|
+
--association-id a-9njjin9gfghecgocd \
|
8
|
+
--role-arn arn:aws:iam::111122223333:role/s3-role
|
9
|
+
|
10
|
+
Output::
|
11
|
+
|
12
|
+
{
|
13
|
+
"association": {
|
14
|
+
"clusterName": "eks-customer",
|
15
|
+
"namespace": "default",
|
16
|
+
"serviceAccount": "default",
|
17
|
+
"roleArn": "arn:aws:iam::111122223333:role/s3-role",
|
18
|
+
"associationArn": "arn:aws:eks:us-west-2:111122223333:podidentityassociation/eks-customer/a-9njjin9gfghecgocd",
|
19
|
+
"associationId": "a-9njjin9gfghecgocd",
|
20
|
+
"tags": {
|
21
|
+
"Key2": "value2",
|
22
|
+
"Key1": "value1"
|
23
|
+
},
|
24
|
+
"createdAt": "2025-05-24T19:52:14.135000-05:00",
|
25
|
+
"modifiedAt": "2025-05-25T21:01:53.120000-05:00"
|
26
|
+
}
|
27
|
+
}
|
28
|
+
|
29
|
+
For more information, see `Learn how EKS Pod Identity grants pods access to AWS services <https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html>`__ in the *Amazon EKS User Guide*.
|
awscli/testutils.py
CHANGED
@@ -43,6 +43,7 @@ from botocore.exceptions import ClientError, WaiterError
|
|
43
43
|
|
44
44
|
import awscli.clidriver
|
45
45
|
from awscli.compat import BytesIO, StringIO
|
46
|
+
from awscli.utils import create_nested_client
|
46
47
|
|
47
48
|
_LOADER = botocore.loaders.Loader()
|
48
49
|
INTEG_LOG = logging.getLogger('awscli.tests.integration')
|
@@ -143,7 +144,7 @@ def create_bucket(session, name=None, region=None):
|
|
143
144
|
"""
|
144
145
|
if not region:
|
145
146
|
region = 'us-west-2'
|
146
|
-
client = session
|
147
|
+
client = create_nested_client(session, 's3', region_name=region)
|
147
148
|
if name:
|
148
149
|
bucket_name = name
|
149
150
|
else:
|
@@ -172,7 +173,7 @@ def create_dir_bucket(session, name=None, location=None):
|
|
172
173
|
if not location:
|
173
174
|
location = ('us-west-2', 'usw2-az1')
|
174
175
|
region, az = location
|
175
|
-
client = session
|
176
|
+
client = create_nested_client(session, 's3', region_name=region)
|
176
177
|
if name:
|
177
178
|
bucket_name = name
|
178
179
|
else:
|
@@ -778,7 +779,7 @@ class BaseS3CLICommand(unittest.TestCase):
|
|
778
779
|
self.session = botocore.session.get_session()
|
779
780
|
self.regions = {}
|
780
781
|
self.region = 'us-west-2'
|
781
|
-
self.client = self.session
|
782
|
+
self.client = create_nested_client(self.session, 's3', region_name=self.region)
|
782
783
|
self.extra_setup()
|
783
784
|
|
784
785
|
def extra_setup(self):
|
@@ -799,7 +800,7 @@ class BaseS3CLICommand(unittest.TestCase):
|
|
799
800
|
|
800
801
|
def create_client_for_bucket(self, bucket_name):
|
801
802
|
region = self.regions.get(bucket_name, self.region)
|
802
|
-
client = self.session
|
803
|
+
client = create_nested_client(self.session, 's3', region_name=region)
|
803
804
|
return client
|
804
805
|
|
805
806
|
def assert_key_contents_equal(self, bucket, key, expected_contents):
|
awscli/utils.py
CHANGED
@@ -311,3 +311,17 @@ class ShapeRecordingVisitor(BaseShapeVisitor):
|
|
311
311
|
|
312
312
|
def visit_shape(self, shape):
|
313
313
|
self.visited.append(shape)
|
314
|
+
|
315
|
+
# NOTE: The following interfaces are considered private and are subject
|
316
|
+
# to abrupt breaking changes. Please do not use them directly.
|
317
|
+
|
318
|
+
try:
|
319
|
+
from botocore.utils import create_nested_client as create_client
|
320
|
+
except ImportError:
|
321
|
+
|
322
|
+
def create_client(session, service_name, **kwargs):
|
323
|
+
return session.create_client(service_name, **kwargs)
|
324
|
+
|
325
|
+
|
326
|
+
def create_nested_client(session, service_name, **kwargs):
|
327
|
+
return create_client(session, service_name, **kwargs)
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: awscli
|
3
|
-
Version: 1.41.
|
3
|
+
Version: 1.41.9
|
4
4
|
Summary: Universal Command Line Environment for AWS.
|
5
5
|
Home-page: http://aws.amazon.com/cli/
|
6
6
|
Author: Amazon Web Services
|
@@ -23,7 +23,7 @@ Classifier: Programming Language :: Python :: 3.12
|
|
23
23
|
Classifier: Programming Language :: Python :: 3.13
|
24
24
|
Requires-Python: >= 3.9
|
25
25
|
License-File: LICENSE.txt
|
26
|
-
Requires-Dist: botocore (==1.39.
|
26
|
+
Requires-Dist: botocore (==1.39.9)
|
27
27
|
Requires-Dist: docutils (<=0.19,>=0.18.1)
|
28
28
|
Requires-Dist: s3transfer (<0.14.0,>=0.13.0)
|
29
29
|
Requires-Dist: PyYAML (<6.1,>=3.10)
|