EKSAuth ******* Client ====== class EKSAuth.Client A low-level client representing Amazon EKS Auth The Amazon EKS Auth API and the "AssumeRoleForPodIdentity" action are only used by the EKS Pod Identity Agent. import boto3 client = boto3.client('eks-auth') These are the available methods: * assume_role_for_pod_identity * can_paginate * close * get_paginator * get_waiter EKSAuth / Client / get_paginator get_paginator ************* EKSAuth.Client.get_paginator(operation_name) Create a paginator for an operation. Parameters: **operation_name** (*string*) -- The operation name. This is the same name as the method name on the client. For example, if the method name is "create_foo", and you'd normally invoke the operation as "client.create_foo(**kwargs)", if the "create_foo" operation can be paginated, you can use the call "client.get_paginator("create_foo")". Raises: **OperationNotPageableError** -- Raised if the operation is not pageable. You can use the "client.can_paginate" method to check if an operation is pageable. Return type: "botocore.paginate.Paginator" Returns: A paginator object. EKSAuth / Client / assume_role_for_pod_identity assume_role_for_pod_identity **************************** EKSAuth.Client.assume_role_for_pod_identity(**kwargs) The Amazon EKS Auth API and the "AssumeRoleForPodIdentity" action are only used by the EKS Pod Identity Agent. We recommend that applications use the Amazon Web Services SDKs to connect to Amazon Web Services services; if credentials from an EKS Pod Identity association are available in the pod, the latest versions of the SDKs use them automatically. See also: AWS API Documentation **Request Syntax** response = client.assume_role_for_pod_identity( clusterName='string', token='string' ) Parameters: * **clusterName** (*string*) -- **[REQUIRED]** The name of the cluster for the request. * **token** (*string*) -- **[REQUIRED]** The token of the Kubernetes service account for the pod. Return type: dict Returns: **Response Syntax** { 'subject': { 'namespace': 'string', 'serviceAccount': 'string' }, 'audience': 'string', 'podIdentityAssociation': { 'associationArn': 'string', 'associationId': 'string' }, 'assumedRoleUser': { 'arn': 'string', 'assumeRoleId': 'string' }, 'credentials': { 'sessionToken': 'string', 'secretAccessKey': 'string', 'accessKeyId': 'string', 'expiration': datetime(2015, 1, 1) } } **Response Structure** * *(dict) --* * **subject** *(dict) --* The name of the Kubernetes service account inside the cluster to associate the IAM credentials with. * **namespace** *(string) --* The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the pods that use the service account must be in this namespace. * **serviceAccount** *(string) --* The name of the Kubernetes service account inside the cluster to associate the IAM credentials with. * **audience** *(string) --* The identity that is allowed to use the credentials. This value is always "pods.eks.amazonaws.com". * **podIdentityAssociation** *(dict) --* The Amazon Resource Name (ARN) and ID of the EKS Pod Identity association. * **associationArn** *(string) --* The Amazon Resource Name (ARN) of the EKS Pod Identity association. * **associationId** *(string) --* The ID of the association. * **assumedRoleUser** *(dict) --* An object with the permanent IAM role identity and the temporary session name. The ARN of the IAM role that the temporary credentials authenticate to. The session name of the temporary session requested to STS. The value is a unique identifier that contains the role ID, a colon ( ":"), and the role session name of the role that is being assumed. The role ID is generated by IAM when the role is created. The role session name part of the value follows this format: "eks-clustername-podname-random UUID" * **arn** *(string) --* The ARN of the IAM role that the temporary credentials authenticate to. * **assumeRoleId** *(string) --* The session name of the temporary session requested to STS. The value is a unique identifier that contains the role ID, a colon ( ":"), and the role session name of the role that is being assumed. The role ID is generated by IAM when the role is created. The role session name part of the value follows this format: "eks-clustername- podname-random UUID" * **credentials** *(dict) --* The *Amazon Web Services Signature Version 4* type of temporary credentials. * **sessionToken** *(string) --* The token that applications inside the pods must pass to any service API to use the temporary credentials. * **secretAccessKey** *(string) --* The secret access key that applications inside the pods use to sign requests. * **accessKeyId** *(string) --* The access key ID that identifies the temporary security credentials. * **expiration** *(datetime) --* The Unix epoch timestamp in seconds when the current credentials expire. **Exceptions** * "EKSAuth.Client.exceptions.ThrottlingException" * "EKSAuth.Client.exceptions.InvalidRequestException" * "EKSAuth.Client.exceptions.AccessDeniedException" * "EKSAuth.Client.exceptions.InternalServerException" * "EKSAuth.Client.exceptions.InvalidTokenException" * "EKSAuth.Client.exceptions.InvalidParameterException" * "EKSAuth.Client.exceptions.ExpiredTokenException" * "EKSAuth.Client.exceptions.ResourceNotFoundException" * "EKSAuth.Client.exceptions.ServiceUnavailableException" EKSAuth / Client / can_paginate can_paginate ************ EKSAuth.Client.can_paginate(operation_name) Check if an operation can be paginated. Parameters: **operation_name** (*string*) -- The operation name. This is the same name as the method name on the client. For example, if the method name is "create_foo", and you'd normally invoke the operation as "client.create_foo(**kwargs)", if the "create_foo" operation can be paginated, you can use the call "client.get_paginator("create_foo")". Returns: "True" if the operation can be paginated, "False" otherwise. EKSAuth / Client / get_waiter get_waiter ********** EKSAuth.Client.get_waiter(waiter_name) Returns an object that can wait for some condition. Parameters: **waiter_name** (*str*) -- The name of the waiter to get. See the waiters section of the service docs for a list of available waiters. Returns: The specified waiter object. Return type: "botocore.waiter.Waiter" EKSAuth / Client / close close ***** EKSAuth.Client.close() Closes underlying endpoint connections.