tccli-intl-en 3.0.1168.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/plugins/sso/__init__.py +14 -0
- tccli/plugins/sso/login.py +23 -6
- tccli/plugins/sso/texts.py +4 -0
- tccli/services/__init__.py +49 -2
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +341 -114
- tccli/services/autoscaling/v20180419/api.json +514 -333
- tccli/services/autoscaling/v20180419/examples.json +46 -38
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/__init__.py +4 -0
- tccli/services/bi/bi_client.py +1498 -0
- tccli/services/bi/v20220105/api.json +5769 -0
- tccli/services/bi/v20220105/examples.json +215 -0
- tccli/services/billing/billing_client.py +1055 -134
- tccli/services/billing/v20180709/api.json +1654 -243
- tccli/services/billing/v20180709/examples.json +169 -25
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/captcha/v20190722/api.json +16 -6
- tccli/services/captcha/v20190722/examples.json +3 -3
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +1167 -268
- tccli/services/ccc/v20200210/api.json +2263 -202
- tccli/services/ccc/v20200210/examples.json +116 -12
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdb/v20170320/api.json +426 -173
- tccli/services/cdb/v20170320/examples.json +6 -6
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfg/v20210820/api.json +30 -10
- tccli/services/cfg/v20210820/examples.json +1 -1
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1033 -255
- tccli/services/ckafka/v20190819/api.json +3378 -1681
- tccli/services/ckafka/v20190819/examples.json +254 -160
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2307 -1024
- tccli/services/clb/v20180317/examples.json +186 -126
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +339 -78
- tccli/services/csip/v20221121/api.json +1011 -38
- tccli/services/csip/v20221121/examples.json +24 -0
- tccli/services/ctsdb/__init__.py +4 -0
- tccli/services/ctsdb/ctsdb_client.py +266 -0
- tccli/services/ctsdb/v20230202/api.json +677 -0
- tccli/services/ctsdb/v20230202/examples.json +20 -0
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +1141 -510
- tccli/services/cvm/v20170312/examples.json +174 -128
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +3051 -575
- tccli/services/cynosdb/v20190107/api.json +14074 -7139
- tccli/services/cynosdb/v20190107/examples.json +597 -287
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +390 -111
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +3104 -117
- tccli/services/emr/v20190103/api.json +15311 -4361
- tccli/services/emr/v20190103/examples.json +452 -42
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +172 -45
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +266 -0
- tccli/services/hunyuan/v20230901/api.json +270 -0
- tccli/services/hunyuan/v20230901/examples.json +20 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iai/v20200303/api.json +187 -51
- tccli/services/iai/v20200303/examples.json +30 -12
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/ims/v20201229/api.json +133 -141
- tccli/services/ims/v20201229/examples.json +3 -3
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +516 -72
- tccli/services/intlpartnersmgt/v20220928/api.json +976 -60
- tccli/services/intlpartnersmgt/v20220928/examples.json +50 -2
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/iotcloud/v20210408/api.json +216 -107
- tccli/services/iotcloud/v20210408/examples.json +9 -9
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +1226 -227
- tccli/services/kms/v20190118/api.json +1562 -144
- tccli/services/kms/v20190118/examples.json +204 -78
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +370 -148
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +804 -232
- tccli/services/live/v20180801/api.json +272 -0
- tccli/services/live/v20180801/examples.json +32 -0
- tccli/services/lke/__init__.py +4 -0
- tccli/services/lke/lke_client.py +5194 -0
- tccli/services/lke/v20231130/api.json +14803 -0
- tccli/services/lke/v20231130/examples.json +736 -0
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +953 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +402 -82
- tccli/services/mdl/v20200326/api.json +1144 -58
- tccli/services/mdl/v20200326/examples.json +48 -16
- tccli/services/mdp/mdp_client.py +785 -122
- tccli/services/mdp/v20200527/api.json +1168 -44
- tccli/services/mdp/v20200527/examples.json +151 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1452 -136
- tccli/services/mongodb/v20190725/api.json +4393 -1462
- tccli/services/mongodb/v20190725/examples.json +265 -71
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +660 -11
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1573 -354
- tccli/services/mps/v20190612/api.json +12394 -7243
- tccli/services/mps/v20190612/examples.json +244 -84
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +596 -102
- tccli/services/ocr/v20181119/api.json +2271 -181
- tccli/services/ocr/v20181119/examples.json +70 -8
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +206 -60
- tccli/services/privatedns/v20201028/api.json +179 -0
- tccli/services/privatedns/v20201028/examples.json +8 -0
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +698 -212
- tccli/services/redis/v20180412/api.json +968 -563
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/__init__.py +4 -0
- tccli/services/region/region_client.py +322 -0
- tccli/services/region/v20220627/api.json +399 -0
- tccli/services/region/v20220627/examples.json +29 -0
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +368 -69
- tccli/services/ses/v20201002/api.json +240 -0
- tccli/services/ses/v20201002/examples.json +32 -0
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3855 -470
- tccli/services/sqlserver/v20180328/api.json +9757 -3347
- tccli/services/sqlserver/v20180328/examples.json +480 -20
- tccli/services/ssl/ssl_client.py +504 -72
- tccli/services/ssl/v20191205/api.json +789 -21
- tccli/services/ssl/v20191205/examples.json +54 -0
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/__init__.py +4 -0
- tccli/services/tbaas/tbaas_client.py +378 -0
- tccli/services/tbaas/v20180416/api.json +551 -0
- tccli/services/tbaas/v20180416/examples.json +37 -0
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +4507 -966
- tccli/services/teo/v20220901/api.json +7341 -1405
- tccli/services/teo/v20220901/examples.json +679 -99
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +741 -274
- tccli/services/tke/v20180525/api.json +132 -7
- tccli/services/tke/v20180525/examples.json +42 -16
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tms/v20201229/api.json +91 -100
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/__init__.py +4 -0
- tccli/services/trabbit/trabbit_client.py +1778 -0
- tccli/services/trabbit/v20230418/api.json +4772 -0
- tccli/services/trabbit/v20230418/examples.json +237 -0
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +928 -192
- tccli/services/trtc/v20190722/api.json +1810 -256
- tccli/services/trtc/v20190722/examples.json +100 -6
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/v20210922/api.json +61 -30
- tccli/services/vm/v20210922/examples.json +0 -12
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/v20180717/api.json +332 -52
- tccli/services/vod/v20180717/examples.json +9 -1
- tccli/services/vod/v20240718/api.json +1105 -0
- tccli/services/vod/v20240718/examples.json +97 -0
- tccli/services/vod/vod_client.py +1316 -350
- tccli/services/vpc/v20170312/api.json +1166 -106
- tccli/services/vpc/v20170312/examples.json +197 -23
- tccli/services/vpc/vpc_client.py +2413 -739
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20210820/api.json +1577 -231
- tccli/services/wedata/v20210820/examples.json +74 -12
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6366 -1191
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +294 -230
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
|
@@ -29,7 +29,10 @@ def doDescribeSecurityAuditLogDownloadUrls(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -41,7 +44,7 @@ def doDescribeSecurityAuditLogDownloadUrls(args, parsed_globals):
|
|
|
41
44
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
42
45
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
43
46
|
)
|
|
44
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
47
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
45
48
|
if g_param[OptionsDefine.Language]:
|
|
46
49
|
profile.language = g_param[OptionsDefine.Language]
|
|
47
50
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -81,7 +84,10 @@ def doDeleteDBDiagReportTasks(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -93,7 +99,7 @@ def doDeleteDBDiagReportTasks(args, parsed_globals):
|
|
|
93
99
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
94
100
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
95
101
|
)
|
|
96
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
102
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
97
103
|
if g_param[OptionsDefine.Language]:
|
|
98
104
|
profile.language = g_param[OptionsDefine.Language]
|
|
99
105
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -133,7 +139,10 @@ def doDescribeMailProfile(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -145,7 +154,7 @@ def doDescribeMailProfile(args, parsed_globals):
|
|
|
145
154
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
146
155
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
147
156
|
)
|
|
148
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
157
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
149
158
|
if g_param[OptionsDefine.Language]:
|
|
150
159
|
profile.language = g_param[OptionsDefine.Language]
|
|
151
160
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -185,7 +194,10 @@ def doCreateSchedulerMailProfile(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -197,7 +209,7 @@ def doCreateSchedulerMailProfile(args, parsed_globals):
|
|
|
197
209
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
198
210
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
199
211
|
)
|
|
200
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
212
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
201
213
|
if g_param[OptionsDefine.Language]:
|
|
202
214
|
profile.language = g_param[OptionsDefine.Language]
|
|
203
215
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -237,7 +249,10 @@ def doDescribeTopSpaceSchemas(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -249,7 +264,7 @@ def doDescribeTopSpaceSchemas(args, parsed_globals):
|
|
|
249
264
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
250
265
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
251
266
|
)
|
|
252
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
267
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
253
268
|
if g_param[OptionsDefine.Language]:
|
|
254
269
|
profile.language = g_param[OptionsDefine.Language]
|
|
255
270
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -289,7 +304,10 @@ def doDescribeMySqlProcessList(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -301,7 +319,7 @@ def doDescribeMySqlProcessList(args, parsed_globals):
|
|
|
301
319
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
302
320
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
303
321
|
)
|
|
304
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
322
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
305
323
|
if g_param[OptionsDefine.Language]:
|
|
306
324
|
profile.language = g_param[OptionsDefine.Language]
|
|
307
325
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -341,7 +359,10 @@ def doCreateMailProfile(args, parsed_globals):
|
|
|
341
359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
361
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
367
|
else:
|
|
347
368
|
cred = credential.Credential(
|
|
@@ -353,7 +374,7 @@ def doCreateMailProfile(args, parsed_globals):
|
|
|
353
374
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
354
375
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
355
376
|
)
|
|
356
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
377
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
357
378
|
if g_param[OptionsDefine.Language]:
|
|
358
379
|
profile.language = g_param[OptionsDefine.Language]
|
|
359
380
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -393,7 +414,10 @@ def doDescribeDBDiagReportTasks(args, parsed_globals):
|
|
|
393
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
416
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
422
|
else:
|
|
399
423
|
cred = credential.Credential(
|
|
@@ -405,7 +429,7 @@ def doDescribeDBDiagReportTasks(args, parsed_globals):
|
|
|
405
429
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
406
430
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
407
431
|
)
|
|
408
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
432
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
409
433
|
if g_param[OptionsDefine.Language]:
|
|
410
434
|
profile.language = g_param[OptionsDefine.Language]
|
|
411
435
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -445,7 +469,10 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
445
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
471
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
477
|
else:
|
|
451
478
|
cred = credential.Credential(
|
|
@@ -457,7 +484,7 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
457
484
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
458
485
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
459
486
|
)
|
|
460
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
487
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
461
488
|
if g_param[OptionsDefine.Language]:
|
|
462
489
|
profile.language = g_param[OptionsDefine.Language]
|
|
463
490
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -497,7 +524,10 @@ def doCreateRedisBigKeyAnalysisTask(args, parsed_globals):
|
|
|
497
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
526
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
532
|
else:
|
|
503
533
|
cred = credential.Credential(
|
|
@@ -509,7 +539,7 @@ def doCreateRedisBigKeyAnalysisTask(args, parsed_globals):
|
|
|
509
539
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
510
540
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
511
541
|
)
|
|
512
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
542
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
513
543
|
if g_param[OptionsDefine.Language]:
|
|
514
544
|
profile.language = g_param[OptionsDefine.Language]
|
|
515
545
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -549,7 +579,10 @@ def doDescribeAllUserGroup(args, parsed_globals):
|
|
|
549
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
581
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
587
|
else:
|
|
555
588
|
cred = credential.Credential(
|
|
@@ -561,7 +594,7 @@ def doDescribeAllUserGroup(args, parsed_globals):
|
|
|
561
594
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
562
595
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
563
596
|
)
|
|
564
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
597
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
565
598
|
if g_param[OptionsDefine.Language]:
|
|
566
599
|
profile.language = g_param[OptionsDefine.Language]
|
|
567
600
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -601,7 +634,10 @@ def doDescribeDBDiagEvents(args, parsed_globals):
|
|
|
601
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
636
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
642
|
else:
|
|
607
643
|
cred = credential.Credential(
|
|
@@ -613,7 +649,7 @@ def doDescribeDBDiagEvents(args, parsed_globals):
|
|
|
613
649
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
614
650
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
615
651
|
)
|
|
616
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
652
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
617
653
|
if g_param[OptionsDefine.Language]:
|
|
618
654
|
profile.language = g_param[OptionsDefine.Language]
|
|
619
655
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -653,7 +689,10 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
653
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
691
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
697
|
else:
|
|
659
698
|
cred = credential.Credential(
|
|
@@ -665,7 +704,7 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
665
704
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
666
705
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
667
706
|
)
|
|
668
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
707
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
669
708
|
if g_param[OptionsDefine.Language]:
|
|
670
709
|
profile.language = g_param[OptionsDefine.Language]
|
|
671
710
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -705,7 +744,10 @@ def doDescribeSlowLogTimeSeriesStats(args, parsed_globals):
|
|
|
705
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
746
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
752
|
else:
|
|
711
753
|
cred = credential.Credential(
|
|
@@ -717,7 +759,7 @@ def doDescribeSlowLogTimeSeriesStats(args, parsed_globals):
|
|
|
717
759
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
718
760
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
719
761
|
)
|
|
720
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
762
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
721
763
|
if g_param[OptionsDefine.Language]:
|
|
722
764
|
profile.language = g_param[OptionsDefine.Language]
|
|
723
765
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -757,7 +799,10 @@ def doDescribeSlowLogUserHostStats(args, parsed_globals):
|
|
|
757
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
801
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
807
|
else:
|
|
763
808
|
cred = credential.Credential(
|
|
@@ -769,7 +814,7 @@ def doDescribeSlowLogUserHostStats(args, parsed_globals):
|
|
|
769
814
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
770
815
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
771
816
|
)
|
|
772
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
817
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
773
818
|
if g_param[OptionsDefine.Language]:
|
|
774
819
|
profile.language = g_param[OptionsDefine.Language]
|
|
775
820
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -809,7 +854,10 @@ def doDescribeTopSpaceTables(args, parsed_globals):
|
|
|
809
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
856
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
862
|
else:
|
|
815
863
|
cred = credential.Credential(
|
|
@@ -821,7 +869,7 @@ def doDescribeTopSpaceTables(args, parsed_globals):
|
|
|
821
869
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
822
870
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
823
871
|
)
|
|
824
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
872
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
825
873
|
if g_param[OptionsDefine.Language]:
|
|
826
874
|
profile.language = g_param[OptionsDefine.Language]
|
|
827
875
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -861,7 +909,10 @@ def doDescribeDBSpaceStatus(args, parsed_globals):
|
|
|
861
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
911
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
917
|
else:
|
|
867
918
|
cred = credential.Credential(
|
|
@@ -873,7 +924,7 @@ def doDescribeDBSpaceStatus(args, parsed_globals):
|
|
|
873
924
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
874
925
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
875
926
|
)
|
|
876
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
877
928
|
if g_param[OptionsDefine.Language]:
|
|
878
929
|
profile.language = g_param[OptionsDefine.Language]
|
|
879
930
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -913,7 +964,10 @@ def doCreateProxySessionKillTask(args, parsed_globals):
|
|
|
913
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
966
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
972
|
else:
|
|
919
973
|
cred = credential.Credential(
|
|
@@ -925,7 +979,7 @@ def doCreateProxySessionKillTask(args, parsed_globals):
|
|
|
925
979
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
926
980
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
927
981
|
)
|
|
928
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
929
983
|
if g_param[OptionsDefine.Language]:
|
|
930
984
|
profile.language = g_param[OptionsDefine.Language]
|
|
931
985
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -965,7 +1019,10 @@ def doDescribeHealthScore(args, parsed_globals):
|
|
|
965
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1021
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1027
|
else:
|
|
971
1028
|
cred = credential.Credential(
|
|
@@ -977,7 +1034,7 @@ def doDescribeHealthScore(args, parsed_globals):
|
|
|
977
1034
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
978
1035
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
979
1036
|
)
|
|
980
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1037
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
981
1038
|
if g_param[OptionsDefine.Language]:
|
|
982
1039
|
profile.language = g_param[OptionsDefine.Language]
|
|
983
1040
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1017,7 +1074,10 @@ def doCreateSecurityAuditLogExportTask(args, parsed_globals):
|
|
|
1017
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1076
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1082
|
else:
|
|
1023
1083
|
cred = credential.Credential(
|
|
@@ -1029,7 +1089,7 @@ def doCreateSecurityAuditLogExportTask(args, parsed_globals):
|
|
|
1029
1089
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1030
1090
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1031
1091
|
)
|
|
1032
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1092
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1033
1093
|
if g_param[OptionsDefine.Language]:
|
|
1034
1094
|
profile.language = g_param[OptionsDefine.Language]
|
|
1035
1095
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1069,7 +1129,10 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
1069
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1131
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1137
|
else:
|
|
1075
1138
|
cred = credential.Credential(
|
|
@@ -1081,7 +1144,7 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
1081
1144
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1082
1145
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1083
1146
|
)
|
|
1084
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1147
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1085
1148
|
if g_param[OptionsDefine.Language]:
|
|
1086
1149
|
profile.language = g_param[OptionsDefine.Language]
|
|
1087
1150
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1121,7 +1184,10 @@ def doDeleteSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
1121
1184
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1185
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1186
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1192
|
else:
|
|
1127
1193
|
cred = credential.Credential(
|
|
@@ -1133,7 +1199,7 @@ def doDeleteSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
1133
1199
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1134
1200
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1135
1201
|
)
|
|
1136
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1202
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1137
1203
|
if g_param[OptionsDefine.Language]:
|
|
1138
1204
|
profile.language = g_param[OptionsDefine.Language]
|
|
1139
1205
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1173,7 +1239,10 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
1173
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1241
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1247
|
else:
|
|
1179
1248
|
cred = credential.Credential(
|
|
@@ -1185,7 +1254,7 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
1185
1254
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1186
1255
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1187
1256
|
)
|
|
1188
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1257
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1189
1258
|
if g_param[OptionsDefine.Language]:
|
|
1190
1259
|
profile.language = g_param[OptionsDefine.Language]
|
|
1191
1260
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1225,7 +1294,10 @@ def doDescribeSlowLogTopSqls(args, parsed_globals):
|
|
|
1225
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1296
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1302
|
else:
|
|
1231
1303
|
cred = credential.Credential(
|
|
@@ -1237,7 +1309,7 @@ def doDescribeSlowLogTopSqls(args, parsed_globals):
|
|
|
1237
1309
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1238
1310
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1239
1311
|
)
|
|
1240
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1312
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1241
1313
|
if g_param[OptionsDefine.Language]:
|
|
1242
1314
|
profile.language = g_param[OptionsDefine.Language]
|
|
1243
1315
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1277,7 +1349,10 @@ def doDescribeSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
1277
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1351
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1357
|
else:
|
|
1283
1358
|
cred = credential.Credential(
|
|
@@ -1289,7 +1364,7 @@ def doDescribeSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
1289
1364
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1290
1365
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1291
1366
|
)
|
|
1292
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1367
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1293
1368
|
if g_param[OptionsDefine.Language]:
|
|
1294
1369
|
profile.language = g_param[OptionsDefine.Language]
|
|
1295
1370
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1329,7 +1404,10 @@ def doDescribeAllUserContact(args, parsed_globals):
|
|
|
1329
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1406
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1412
|
else:
|
|
1335
1413
|
cred = credential.Credential(
|
|
@@ -1341,7 +1419,7 @@ def doDescribeAllUserContact(args, parsed_globals):
|
|
|
1341
1419
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1342
1420
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1343
1421
|
)
|
|
1344
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1422
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1345
1423
|
if g_param[OptionsDefine.Language]:
|
|
1346
1424
|
profile.language = g_param[OptionsDefine.Language]
|
|
1347
1425
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1381,7 +1459,10 @@ def doDescribeRedisTopKeyPrefixList(args, parsed_globals):
|
|
|
1381
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1461
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1467
|
else:
|
|
1387
1468
|
cred = credential.Credential(
|
|
@@ -1393,7 +1474,7 @@ def doDescribeRedisTopKeyPrefixList(args, parsed_globals):
|
|
|
1393
1474
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1394
1475
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1395
1476
|
)
|
|
1396
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1477
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1397
1478
|
if g_param[OptionsDefine.Language]:
|
|
1398
1479
|
profile.language = g_param[OptionsDefine.Language]
|
|
1399
1480
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1433,7 +1514,10 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
1433
1514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1516
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1522
|
else:
|
|
1439
1523
|
cred = credential.Credential(
|
|
@@ -1445,7 +1529,7 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
1445
1529
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1446
1530
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1447
1531
|
)
|
|
1448
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1532
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1449
1533
|
if g_param[OptionsDefine.Language]:
|
|
1450
1534
|
profile.language = g_param[OptionsDefine.Language]
|
|
1451
1535
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1485,7 +1569,10 @@ def doDescribeDBDiagEvent(args, parsed_globals):
|
|
|
1485
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1571
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1577
|
else:
|
|
1491
1578
|
cred = credential.Credential(
|
|
@@ -1497,7 +1584,7 @@ def doDescribeDBDiagEvent(args, parsed_globals):
|
|
|
1497
1584
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1498
1585
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1499
1586
|
)
|
|
1500
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1587
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1501
1588
|
if g_param[OptionsDefine.Language]:
|
|
1502
1589
|
profile.language = g_param[OptionsDefine.Language]
|
|
1503
1590
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1537,7 +1624,10 @@ def doDescribeDBDiagHistory(args, parsed_globals):
|
|
|
1537
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1626
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1632
|
else:
|
|
1543
1633
|
cred = credential.Credential(
|
|
@@ -1549,7 +1639,7 @@ def doDescribeDBDiagHistory(args, parsed_globals):
|
|
|
1549
1639
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1550
1640
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1551
1641
|
)
|
|
1552
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1642
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1553
1643
|
if g_param[OptionsDefine.Language]:
|
|
1554
1644
|
profile.language = g_param[OptionsDefine.Language]
|
|
1555
1645
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1589,7 +1679,10 @@ def doDescribeProxyProcessStatistics(args, parsed_globals):
|
|
|
1589
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1681
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1687
|
else:
|
|
1595
1688
|
cred = credential.Credential(
|
|
@@ -1601,7 +1694,7 @@ def doDescribeProxyProcessStatistics(args, parsed_globals):
|
|
|
1601
1694
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1602
1695
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1603
1696
|
)
|
|
1604
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1697
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1605
1698
|
if g_param[OptionsDefine.Language]:
|
|
1606
1699
|
profile.language = g_param[OptionsDefine.Language]
|
|
1607
1700
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1641,7 +1734,10 @@ def doCreateDBDiagReportTask(args, parsed_globals):
|
|
|
1641
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1736
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1742
|
else:
|
|
1647
1743
|
cred = credential.Credential(
|
|
@@ -1653,7 +1749,7 @@ def doCreateDBDiagReportTask(args, parsed_globals):
|
|
|
1653
1749
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1654
1750
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1655
1751
|
)
|
|
1656
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1752
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1657
1753
|
if g_param[OptionsDefine.Language]:
|
|
1658
1754
|
profile.language = g_param[OptionsDefine.Language]
|
|
1659
1755
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1693,7 +1789,10 @@ def doDescribeDiagDBInstances(args, parsed_globals):
|
|
|
1693
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1791
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1797
|
else:
|
|
1699
1798
|
cred = credential.Credential(
|
|
@@ -1705,7 +1804,7 @@ def doDescribeDiagDBInstances(args, parsed_globals):
|
|
|
1705
1804
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1706
1805
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1707
1806
|
)
|
|
1708
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1807
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1709
1808
|
if g_param[OptionsDefine.Language]:
|
|
1710
1809
|
profile.language = g_param[OptionsDefine.Language]
|
|
1711
1810
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1745,7 +1844,10 @@ def doAddUserContact(args, parsed_globals):
|
|
|
1745
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1846
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1852
|
else:
|
|
1751
1853
|
cred = credential.Credential(
|
|
@@ -1757,7 +1859,7 @@ def doAddUserContact(args, parsed_globals):
|
|
|
1757
1859
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1758
1860
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1759
1861
|
)
|
|
1760
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1862
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1761
1863
|
if g_param[OptionsDefine.Language]:
|
|
1762
1864
|
profile.language = g_param[OptionsDefine.Language]
|
|
1763
1865
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1797,7 +1899,10 @@ def doDescribeTopSpaceSchemaTimeSeries(args, parsed_globals):
|
|
|
1797
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
1901
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
1907
|
else:
|
|
1803
1908
|
cred = credential.Credential(
|
|
@@ -1809,7 +1914,7 @@ def doDescribeTopSpaceSchemaTimeSeries(args, parsed_globals):
|
|
|
1809
1914
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1810
1915
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1811
1916
|
)
|
|
1812
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1917
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1813
1918
|
if g_param[OptionsDefine.Language]:
|
|
1814
1919
|
profile.language = g_param[OptionsDefine.Language]
|
|
1815
1920
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1849,7 +1954,10 @@ def doCreateKillTask(args, parsed_globals):
|
|
|
1849
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
1956
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
1962
|
else:
|
|
1855
1963
|
cred = credential.Credential(
|
|
@@ -1861,7 +1969,7 @@ def doCreateKillTask(args, parsed_globals):
|
|
|
1861
1969
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1862
1970
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1863
1971
|
)
|
|
1864
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1972
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1865
1973
|
if g_param[OptionsDefine.Language]:
|
|
1866
1974
|
profile.language = g_param[OptionsDefine.Language]
|
|
1867
1975
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1901,7 +2009,10 @@ def doDescribeUserSqlAdvice(args, parsed_globals):
|
|
|
1901
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2011
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2017
|
else:
|
|
1907
2018
|
cred = credential.Credential(
|
|
@@ -1913,7 +2024,7 @@ def doDescribeUserSqlAdvice(args, parsed_globals):
|
|
|
1913
2024
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1914
2025
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1915
2026
|
)
|
|
1916
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2027
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1917
2028
|
if g_param[OptionsDefine.Language]:
|
|
1918
2029
|
profile.language = g_param[OptionsDefine.Language]
|
|
1919
2030
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1953,7 +2064,10 @@ def doDescribeTopSpaceTableTimeSeries(args, parsed_globals):
|
|
|
1953
2064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1954
2065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1955
2066
|
)
|
|
1956
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1957
2071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1958
2072
|
else:
|
|
1959
2073
|
cred = credential.Credential(
|
|
@@ -1965,7 +2079,7 @@ def doDescribeTopSpaceTableTimeSeries(args, parsed_globals):
|
|
|
1965
2079
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1966
2080
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1967
2081
|
)
|
|
1968
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1969
2083
|
if g_param[OptionsDefine.Language]:
|
|
1970
2084
|
profile.language = g_param[OptionsDefine.Language]
|
|
1971
2085
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2005,7 +2119,10 @@ def doModifyDiagDBInstanceConf(args, parsed_globals):
|
|
|
2005
2119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2006
2120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2007
2121
|
)
|
|
2008
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2009
2126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2010
2127
|
else:
|
|
2011
2128
|
cred = credential.Credential(
|
|
@@ -2017,7 +2134,7 @@ def doModifyDiagDBInstanceConf(args, parsed_globals):
|
|
|
2017
2134
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2018
2135
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2019
2136
|
)
|
|
2020
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2137
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2021
2138
|
if g_param[OptionsDefine.Language]:
|
|
2022
2139
|
profile.language = g_param[OptionsDefine.Language]
|
|
2023
2140
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2057,7 +2174,10 @@ def doKillMySqlThreads(args, parsed_globals):
|
|
|
2057
2174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2058
2175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2059
2176
|
)
|
|
2060
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2061
2181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2062
2182
|
else:
|
|
2063
2183
|
cred = credential.Credential(
|
|
@@ -2069,7 +2189,7 @@ def doKillMySqlThreads(args, parsed_globals):
|
|
|
2069
2189
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2070
2190
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2071
2191
|
)
|
|
2072
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2192
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2073
2193
|
if g_param[OptionsDefine.Language]:
|
|
2074
2194
|
profile.language = g_param[OptionsDefine.Language]
|
|
2075
2195
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2109,7 +2229,10 @@ def doCreateDBDiagReportUrl(args, parsed_globals):
|
|
|
2109
2229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2110
2230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2111
2231
|
)
|
|
2112
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2113
2236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2114
2237
|
else:
|
|
2115
2238
|
cred = credential.Credential(
|
|
@@ -2121,7 +2244,7 @@ def doCreateDBDiagReportUrl(args, parsed_globals):
|
|
|
2121
2244
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2122
2245
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2123
2246
|
)
|
|
2124
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2247
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2125
2248
|
if g_param[OptionsDefine.Language]:
|
|
2126
2249
|
profile.language = g_param[OptionsDefine.Language]
|
|
2127
2250
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2161,7 +2284,10 @@ def doDescribeProxySessionKillTasks(args, parsed_globals):
|
|
|
2161
2284
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2162
2285
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2163
2286
|
)
|
|
2164
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2287
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2289
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2290
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2165
2291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2166
2292
|
else:
|
|
2167
2293
|
cred = credential.Credential(
|
|
@@ -2173,7 +2299,7 @@ def doDescribeProxySessionKillTasks(args, parsed_globals):
|
|
|
2173
2299
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2174
2300
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2175
2301
|
)
|
|
2176
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2302
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2177
2303
|
if g_param[OptionsDefine.Language]:
|
|
2178
2304
|
profile.language = g_param[OptionsDefine.Language]
|
|
2179
2305
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|