{ "version":"2.0", "metadata":{ "apiVersion":"2023-11-26", "endpointPrefix":"eks-auth", "jsonVersion":"1.1", "protocol":"rest-json", "serviceFullName":"Amazon EKS Auth", "serviceId":"EKS Auth", "signatureVersion":"v4", "signingName":"eks-auth", "uid":"eks-auth-2023-11-26" }, "operations":{ "AssumeRoleForPodIdentity":{ "name":"AssumeRoleForPodIdentity", "http":{ "method":"POST", "requestUri":"/clusters/{clusterName}/assume-role-for-pod-identity", "responseCode":200 }, "input":{"shape":"AssumeRoleForPodIdentityRequest"}, "output":{"shape":"AssumeRoleForPodIdentityResponse"}, "errors":[ {"shape":"ThrottlingException"}, {"shape":"InvalidRequestException"}, {"shape":"AccessDeniedException"}, {"shape":"InternalServerException"}, {"shape":"InvalidTokenException"}, {"shape":"InvalidParameterException"}, {"shape":"ExpiredTokenException"}, {"shape":"ResourceNotFoundException"}, {"shape":"ServiceUnavailableException"} ], "documentation":"
The Amazon EKS Auth API and the AssumeRoleForPodIdentity
action are only used by the EKS Pod Identity Agent.
We recommend that applications use the Amazon Web Services SDKs to connect to Amazon Web Services services; if credentials from an EKS Pod Identity association are available in the pod, the latest versions of the SDKs use them automatically.
" } }, "shapes":{ "AccessDeniedException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"You don't have permissions to perform the requested operation. The IAM principal making the request must have at least one IAM permissions policy attached that grants the required permissions. For more information, see Access management in the IAM User Guide.
", "error":{ "httpStatusCode":400, "senderFault":true }, "exception":true }, "AssumeRoleForPodIdentityRequest":{ "type":"structure", "required":[ "clusterName", "token" ], "members":{ "clusterName":{ "shape":"ClusterName", "documentation":"The name of the cluster for the request.
", "location":"uri", "locationName":"clusterName" }, "token":{ "shape":"JwtToken", "documentation":"The token of the Kubernetes service account for the pod.
" } } }, "AssumeRoleForPodIdentityResponse":{ "type":"structure", "required":[ "subject", "audience", "podIdentityAssociation", "assumedRoleUser", "credentials" ], "members":{ "subject":{ "shape":"Subject", "documentation":"The name of the Kubernetes service account inside the cluster to associate the IAM credentials with.
" }, "audience":{ "shape":"String", "documentation":"The identity that is allowed to use the credentials. This value is always pods.eks.amazonaws.com
.
The Amazon Resource Name (ARN) and ID of the EKS Pod Identity association.
" }, "assumedRoleUser":{ "shape":"AssumedRoleUser", "documentation":"An object with the permanent IAM role identity and the temporary session name.
The ARN of the IAM role that the temporary credentials authenticate to.
The session name of the temporary session requested to STS. The value is a unique identifier that contains the role ID, a colon (:
), and the role session name of the role that is being assumed. The role ID is generated by IAM when the role is created. The role session name part of the value follows this format: eks-clustername-podname-random UUID
The Amazon Web Services Signature Version 4 type of temporary credentials.
" } } }, "AssumedRoleUser":{ "type":"structure", "required":[ "arn", "assumeRoleId" ], "members":{ "arn":{ "shape":"String", "documentation":"The ARN of the IAM role that the temporary credentials authenticate to.
" }, "assumeRoleId":{ "shape":"String", "documentation":"The session name of the temporary session requested to STS. The value is a unique identifier that contains the role ID, a colon (:
), and the role session name of the role that is being assumed. The role ID is generated by IAM when the role is created. The role session name part of the value follows this format: eks-clustername-podname-random UUID
An object with the permanent IAM role identity and the temporary session name.
" }, "ClusterName":{ "type":"string", "max":100, "min":1, "pattern":"[0-9A-Za-z][A-Za-z0-9\\-_]*" }, "Credentials":{ "type":"structure", "required":[ "sessionToken", "secretAccessKey", "accessKeyId", "expiration" ], "members":{ "sessionToken":{ "shape":"String", "documentation":"The token that applications inside the pods must pass to any service API to use the temporary credentials.
" }, "secretAccessKey":{ "shape":"String", "documentation":"The secret access key that applications inside the pods use to sign requests.
" }, "accessKeyId":{ "shape":"String", "documentation":"The access key ID that identifies the temporary security credentials.
" }, "expiration":{ "shape":"Timestamp", "documentation":"The Unix epoch timestamp in seconds when the current credentials expire.
" } }, "documentation":"The Amazon Web Services Signature Version 4 type of temporary credentials.
", "sensitive":true }, "ExpiredTokenException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"The specified Kubernetes service account token is expired.
", "error":{ "httpStatusCode":400, "senderFault":true }, "exception":true }, "InternalServerException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"These errors are usually caused by a server-side issue.
", "error":{"httpStatusCode":500}, "exception":true, "fault":true }, "InvalidParameterException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"The specified parameter is invalid. Review the available parameters for the API request.
", "error":{ "httpStatusCode":400, "senderFault":true }, "exception":true }, "InvalidRequestException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"This exception is thrown if the request contains a semantic error. The precise meaning will depend on the API, and will be documented in the error message.
", "error":{ "httpStatusCode":400, "senderFault":true }, "exception":true }, "InvalidTokenException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"The specified Kubernetes service account token is invalid.
", "error":{ "httpStatusCode":400, "senderFault":true }, "exception":true }, "JwtToken":{ "type":"string", "min":1, "pattern":"[A-Za-z0-9-_=]+\\.[A-Za-z0-9-_=]+\\.[A-Za-z0-9-_=]+", "sensitive":true }, "PodIdentityAssociation":{ "type":"structure", "required":[ "associationArn", "associationId" ], "members":{ "associationArn":{ "shape":"String", "documentation":"The Amazon Resource Name (ARN) of the EKS Pod Identity association.
" }, "associationId":{ "shape":"String", "documentation":"The ID of the association.
" } }, "documentation":"Amazon EKS Pod Identity associations provide the ability to manage credentials for your applications, similar to the way that Amazon EC2 instance profiles provide credentials to Amazon EC2 instances.
" }, "ResourceNotFoundException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"The specified resource could not be found.
", "error":{ "httpStatusCode":404, "senderFault":true }, "exception":true }, "ServiceUnavailableException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"The service is unavailable. Back off and retry the operation.
", "error":{"httpStatusCode":503}, "exception":true, "fault":true }, "String":{"type":"string"}, "Subject":{ "type":"structure", "required":[ "namespace", "serviceAccount" ], "members":{ "namespace":{ "shape":"String", "documentation":"The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the pods that use the service account must be in this namespace.
" }, "serviceAccount":{ "shape":"String", "documentation":"The name of the Kubernetes service account inside the cluster to associate the IAM credentials with.
" } }, "documentation":"An object containing the name of the Kubernetes service account inside the cluster to associate the IAM credentials with.
" }, "ThrottlingException":{ "type":"structure", "members":{ "message":{"shape":"String"} }, "documentation":"The request was denied because your request rate is too high. Reduce the frequency of requests.
", "error":{ "httpStatusCode":429, "senderFault":true }, "exception":true }, "Timestamp":{"type":"timestamp"} }, "documentation":"The Amazon EKS Auth API and the AssumeRoleForPodIdentity
action are only used by the EKS Pod Identity Agent.