tccli-intl-en 3.0.1188.1__py2.py3-none-any.whl → 3.1.28.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/plugins/sso/__init__.py +14 -0
- tccli/plugins/sso/login.py +23 -6
- tccli/plugins/sso/texts.py +4 -0
- tccli/services/__init__.py +46 -2
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +341 -114
- tccli/services/autoscaling/v20180419/api.json +444 -272
- tccli/services/autoscaling/v20180419/examples.json +46 -38
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/__init__.py +4 -0
- tccli/services/bi/bi_client.py +1498 -0
- tccli/services/bi/v20220105/api.json +5769 -0
- tccli/services/bi/v20220105/examples.json +215 -0
- tccli/services/billing/billing_client.py +1007 -139
- tccli/services/billing/v20180709/api.json +1707 -429
- tccli/services/billing/v20180709/examples.json +161 -25
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/captcha/v20190722/api.json +16 -6
- tccli/services/captcha/v20190722/examples.json +3 -3
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +1167 -268
- tccli/services/ccc/v20200210/api.json +2263 -202
- tccli/services/ccc/v20200210/examples.json +116 -12
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdb/v20170320/api.json +463 -208
- tccli/services/cdb/v20170320/examples.json +8 -8
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdn/v20180606/api.json +22 -22
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfg/v20210820/api.json +30 -10
- tccli/services/cfg/v20210820/examples.json +1 -1
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1149 -259
- tccli/services/ckafka/v20190819/api.json +3738 -1696
- tccli/services/ckafka/v20190819/examples.json +266 -162
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2273 -1020
- tccli/services/clb/v20180317/examples.json +184 -124
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +339 -78
- tccli/services/csip/v20221121/api.json +1011 -38
- tccli/services/csip/v20221121/examples.json +24 -0
- tccli/services/ctsdb/__init__.py +4 -0
- tccli/services/ctsdb/ctsdb_client.py +266 -0
- tccli/services/ctsdb/v20230202/api.json +677 -0
- tccli/services/ctsdb/v20230202/examples.json +20 -0
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +1003 -453
- tccli/services/cvm/v20170312/examples.json +176 -130
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +2272 -591
- tccli/services/cynosdb/v20190107/api.json +12480 -7740
- tccli/services/cynosdb/v20190107/examples.json +193 -9
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +390 -111
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +3104 -117
- tccli/services/emr/v20190103/api.json +15311 -4361
- tccli/services/emr/v20190103/examples.json +452 -42
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +172 -45
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +490 -0
- tccli/services/hunyuan/v20230901/api.json +566 -0
- tccli/services/hunyuan/v20230901/examples.json +52 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iai/v20200303/api.json +187 -51
- tccli/services/iai/v20200303/examples.json +30 -12
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/ims/v20201229/api.json +133 -141
- tccli/services/ims/v20201229/examples.json +3 -3
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +363 -78
- tccli/services/intlpartnersmgt/v20220928/api.json +513 -22
- tccli/services/intlpartnersmgt/v20220928/examples.json +24 -0
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/iotcloud/v20210408/api.json +216 -107
- tccli/services/iotcloud/v20210408/examples.json +9 -9
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +1226 -227
- tccli/services/kms/v20190118/api.json +1465 -123
- tccli/services/kms/v20190118/examples.json +129 -3
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +730 -172
- tccli/services/lighthouse/v20200324/api.json +502 -14
- tccli/services/lighthouse/v20200324/examples.json +59 -5
- tccli/services/live/live_client.py +804 -232
- tccli/services/live/v20180801/api.json +272 -0
- tccli/services/live/v20180801/examples.json +32 -0
- tccli/services/lke/__init__.py +4 -0
- tccli/services/lke/lke_client.py +5194 -0
- tccli/services/lke/v20231130/api.json +14803 -0
- tccli/services/lke/v20231130/examples.json +736 -0
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +989 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +402 -82
- tccli/services/mdl/v20200326/api.json +1437 -100
- tccli/services/mdl/v20200326/examples.json +48 -16
- tccli/services/mdp/mdp_client.py +785 -122
- tccli/services/mdp/v20200527/api.json +1336 -49
- tccli/services/mdp/v20200527/examples.json +151 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1452 -136
- tccli/services/mongodb/v20190725/api.json +4393 -1462
- tccli/services/mongodb/v20190725/examples.json +265 -71
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +664 -15
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1878 -379
- tccli/services/mps/v20190612/api.json +7473 -1626
- tccli/services/mps/v20190612/examples.json +276 -82
- tccli/services/mqtt/__init__.py +4 -0
- tccli/services/mqtt/mqtt_client.py +1610 -0
- tccli/services/mqtt/v20240516/api.json +3057 -0
- tccli/services/mqtt/v20240516/examples.json +213 -0
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +515 -74
- tccli/services/ocr/v20181119/api.json +1991 -168
- tccli/services/ocr/v20181119/examples.json +58 -4
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +206 -60
- tccli/services/privatedns/v20201028/api.json +179 -0
- tccli/services/privatedns/v20201028/examples.json +8 -0
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +698 -212
- tccli/services/redis/v20180412/api.json +968 -563
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/__init__.py +4 -0
- tccli/services/region/region_client.py +322 -0
- tccli/services/region/v20220627/api.json +399 -0
- tccli/services/region/v20220627/examples.json +29 -0
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +368 -69
- tccli/services/ses/v20201002/api.json +240 -0
- tccli/services/ses/v20201002/examples.json +32 -0
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3855 -470
- tccli/services/sqlserver/v20180328/api.json +9757 -3347
- tccli/services/sqlserver/v20180328/examples.json +480 -20
- tccli/services/ssl/ssl_client.py +504 -72
- tccli/services/ssl/v20191205/api.json +789 -21
- tccli/services/ssl/v20191205/examples.json +54 -0
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +1084 -980
- tccli/services/tcsas/v20250106/examples.json +15 -15
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +4507 -966
- tccli/services/teo/v20220901/api.json +7341 -1405
- tccli/services/teo/v20220901/examples.json +679 -99
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +858 -276
- tccli/services/tke/v20180525/api.json +227 -0
- tccli/services/tke/v20180525/examples.json +24 -0
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tms/v20201229/api.json +91 -100
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +928 -192
- tccli/services/trtc/v20190722/api.json +1810 -256
- tccli/services/trtc/v20190722/examples.json +100 -6
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/v20210922/api.json +61 -30
- tccli/services/vm/v20210922/examples.json +0 -12
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/v20180717/api.json +531 -54
- tccli/services/vod/v20180717/examples.json +25 -7
- tccli/services/vod/v20240718/api.json +1105 -0
- tccli/services/vod/v20240718/examples.json +97 -0
- tccli/services/vod/vod_client.py +1428 -350
- tccli/services/vpc/v20170312/api.json +1031 -133
- tccli/services/vpc/v20170312/examples.json +119 -23
- tccli/services/vpc/vpc_client.py +2159 -644
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/RECORD +292 -232
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/top_level.txt +0 -0
|
@@ -190,6 +190,22 @@
|
|
|
190
190
|
"title": "Query Certificate Cloud Resource Update Record Information"
|
|
191
191
|
}
|
|
192
192
|
],
|
|
193
|
+
"DescribeHostUploadUpdateRecord": [
|
|
194
|
+
{
|
|
195
|
+
"document": "",
|
|
196
|
+
"input": "POST / HTTP/1.1\nHost: ssl.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeHostUploadUpdateRecord\n<Common request parameters>\n\n{\n \"OldCertificateId\": \"OMhKAc35\"\n}",
|
|
197
|
+
"output": "{\n \"Response\": {\n \"TotalCount\": 3,\n \"DeployRecordList\": [\n {\n \"Id\": 3,\n \"OldCertId\": \"OMhKAc35\",\n \"ResourceTypes\": [\n \"clb\"\n ],\n \"Status\": 0,\n \"CreateTime\": \"2025-05-27 12:05:26\",\n \"UpdateTime\": \"2025-05-27 12:05:26\"\n },\n {\n \"Id\": 2,\n \"OldCertId\": \"OMhKAc35\",\n \"ResourceTypes\": [\n \"clb\"\n ],\n \"Status\": 7,\n \"CreateTime\": \"2025-05-26 18:05:38\",\n \"UpdateTime\": \"2025-05-26 18:45:12\"\n },\n {\n \"Id\": 1,\n \"OldCertId\": \"OMhKAc35\",\n \"ResourceTypes\": [\n \"clb\"\n ],\n \"Status\": 4,\n \"CreateTime\": \"2025-05-26 12:51:43\",\n \"UpdateTime\": \"2025-05-26 17:51:43\"\n }\n ],\n \"RequestId\": \"79b4dae4-51a7-4345-9b2b-0c6a29f69291\"\n }\n}",
|
|
198
|
+
"title": "Query Certificate Cloud Resource Updates (Certificate ID Unchanged) Record List"
|
|
199
|
+
}
|
|
200
|
+
],
|
|
201
|
+
"DescribeHostUploadUpdateRecordDetail": [
|
|
202
|
+
{
|
|
203
|
+
"document": "",
|
|
204
|
+
"input": "POST / HTTP/1.1\nHost: ssl.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeHostUploadUpdateRecordDetail\n<Common request parameters>\n\n{\n \"DeployRecordId\": \"2\",\n \"Limit\": \"15\",\n \"Offset\": \"0\"\n}",
|
|
205
|
+
"output": "{\n \"Response\": {\n \"DeployRecordDetail\": [\n {\n \"TotalCount\": 1,\n \"SuccessTotalCount\": 1,\n \"FailedTotalCount\": 0,\n \"RunningTotalCount\": 0,\n \"RecordDetailList\": [\n {\n \"ResourceType\": \"clb\",\n \"List\": [\n {\n \"Id\": 57,\n \"OldCertId\": \"OMhKAc35\",\n \"Status\": 1,\n \"ErrorMsg\": \"\",\n \"CreateTime\": \"2025-05-20T07:03:17.000000Z\",\n \"UpdateTime\": \"2025-05-20T07:05:43.000000Z\",\n \"InstanceId\": \"lb-9crou4ha\",\n \"InstanceName\": \"lb-677209fa-qP3T\",\n \"ListenerId\": \"lbl-dlu2mqpu\",\n \"ListenerName\": \"tencent\",\n \"Domains\": [\n \"tencent.com,www.tencent.online,www.qq.com\"\n ],\n \"Protocol\": \"HTTPS\",\n \"SniSwitch\": 0,\n \"Forward\": 1,\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"ResourceType\": \"clb\",\n \"Region\": \"ap-guangzhou\",\n \"Bucket\": \"\",\n \"Namespace\": \"\",\n \"SecretName\": \"\",\n \"Port\": 0\n }\n ],\n \"TotalCount\": 1\n }\n ],\n \"Type\": 0,\n \"Status\": 1,\n \"CreateTime\": \"2025-05-20 15:03:17\"\n },\n {\n \"TotalCount\": 1,\n \"SuccessTotalCount\": 1,\n \"FailedTotalCount\": 0,\n \"RunningTotalCount\": 0,\n \"RecordDetailList\": [\n {\n \"ResourceType\": \"clb\",\n \"List\": [\n {\n \"Id\": 85,\n \"OldCertId\": \"OMhKAc35\",\n \"Status\": 1,\n \"ErrorMsg\": \"\",\n \"CreateTime\": \"2025-05-20T07:18:58.000000Z\",\n \"UpdateTime\": \"2025-05-20T07:23:17.000000Z\",\n \"InstanceId\": \"lb-9crou4ha\",\n \"InstanceName\": \"lb-677209fa-qP3T\",\n \"ListenerId\": \"lbl-dlu2mqpu\",\n \"ListenerName\": \"tencent\",\n \"Domains\": [\n \"tencent.com,www.tencent.online,www.qq.com\"\n ],\n \"Protocol\": \"HTTPS\",\n \"SniSwitch\": 0,\n \"Forward\": 1,\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"ResourceType\": \"clb\",\n \"Region\": \"ap-guangzhou\",\n \"Bucket\": \"\",\n \"Namespace\": \"\",\n \"SecretName\": \"\",\n \"Port\": 0\n }\n ],\n \"TotalCount\": 1\n }\n ],\n \"Type\": 1,\n \"Status\": 4,\n \"CreateTime\": \"2025-05-20 15:18:58\"\n }\n ],\n \"RequestId\": \"79b4dae4-51a7-4345-9b2b-0c6a29f69291\"\n }\n}",
|
|
206
|
+
"title": "Querying Certificate Renewal (Certificate ID Unchanged) Deployment Record Details - Existent Rollback Record"
|
|
207
|
+
}
|
|
208
|
+
],
|
|
193
209
|
"DownloadCertificate": [
|
|
194
210
|
{
|
|
195
211
|
"document": " ",
|
|
@@ -230,6 +246,14 @@
|
|
|
230
246
|
"title": "Re-submitting a review application for a certificate whose review failed"
|
|
231
247
|
}
|
|
232
248
|
],
|
|
249
|
+
"ModifyCertificatesExpiringNotificationSwitch": [
|
|
250
|
+
{
|
|
251
|
+
"document": "This example shows you how to modify whether to ignore certificate expiration notification",
|
|
252
|
+
"input": "POST / HTTP/1.1\nHost: ssl.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyCertificatesExpiringNotificationSwitch\n<Common request parameters>\n\n{\n \"SwitchStatus\": 1,\n \"CertificateIds\": [\n \"Thd**jjd\"\n ]\n}",
|
|
253
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"14727a68-3b90-4408-99c9-dea6d7de9456\",\n \"CertificateIds\": [\n \"Thd**jjd\"\n ]\n }\n}",
|
|
254
|
+
"title": "Modify Whether to Ignore Certificate Expiration Notice"
|
|
255
|
+
}
|
|
256
|
+
],
|
|
233
257
|
"ReplaceCertificate": [
|
|
234
258
|
{
|
|
235
259
|
"document": "",
|
|
@@ -309,6 +333,36 @@
|
|
|
309
333
|
"output": "{\n \"Response\": {\n \"RequestId\": \"15dc3823-4089-4fd6-81a6-ec8baf5ec330\",\n \"CertificateId\": \"flSFd6Fh\",\n \"IsSuccess\": true\n }\n}",
|
|
310
334
|
"title": "Uploading the confirmation letter for a certificate"
|
|
311
335
|
}
|
|
336
|
+
],
|
|
337
|
+
"UploadUpdateCertificateInstance": [
|
|
338
|
+
{
|
|
339
|
+
"document": "",
|
|
340
|
+
"input": "POST / HTTP/1.1\nHost: ssl.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UploadUpdateCertificateInstance\n<Common request parameters>\n\n{\n \"OldCertificateId\": \"JADeKqED\",\n \"CertificatePublicKey\": \"-----BEGIN CERTIFICATE-----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\\nJVMf0yj6miO+34kMVd4=\\n-----END CERTIFICATE-----\\n-----BEGIN CERTIFICATE-----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\\ngJE=\\n-----END CERTIFICATE-----\",\n \"CertificatePrivateKey\": \"-----BEGIN RSA PRIVATE KEY-----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\\r\\nUJK+b7LsuWAF6jkgie8wcL9yhgUjpXoiOlaawfzgna4vlwlFhw/ecyY=\\r\\n-----END RSA PRIVATE KEY-----\",\n \"ResourceTypes\": [\n \"clb\"\n ],\n \"ResourceTypesRegions\": [\n {\n \"Regions\": [\n \"ap-qingyuan\"\n ],\n \"ResourceType\": \"clb\"\n }\n ]\n}",
|
|
341
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"f716e441-d96a-4480-abb4-dd4925fd79b1\",\n \"DeployRecordId\": 0,\n \"DeployStatus\": 0,\n \"UpdateSyncProgress\": [\n {\n \"ResourceType\": \"clb\",\n \"UpdateSyncProgressRegions\": [\n {\n \"TotalCount\": null,\n \"OffsetCount\": null,\n \"Status\": 0,\n \"Region\": \"ap-qingyuan\"\n }\n ],\n \"Status\": 0\n }\n ]\n }\n}",
|
|
342
|
+
"title": "Updating Certificate Content (Certificate ID Unchanged) and Updating Associated Tencent Cloud Resources"
|
|
343
|
+
}
|
|
344
|
+
],
|
|
345
|
+
"UploadUpdateCertificateRecordRetry": [
|
|
346
|
+
{
|
|
347
|
+
"document": "",
|
|
348
|
+
"input": "POST / HTTP/1.1\nHost: ssl.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UploadUpdateCertificateRecordRetry\n<Common request parameters>\n\n{\n \"DeployRecordId\": 2\n}",
|
|
349
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"79b4dae4-51a7-4345-9b2b-0c6a29f69291\"\n }\n}",
|
|
350
|
+
"title": "Cloud Resource Updates (Certificate ID Unchanged) Retry Deployment Record - Retry All Failure Records"
|
|
351
|
+
},
|
|
352
|
+
{
|
|
353
|
+
"document": "",
|
|
354
|
+
"input": "POST / HTTP/1.1\nHost: ssl.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UploadUpdateCertificateRecordRetry\n<Common request parameters>\n\n{\n \"DeployRecordDetailId\": 2\n}",
|
|
355
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"79b4dae4-51a7-4345-9b2b-0c6a29f69291\"\n }\n}",
|
|
356
|
+
"title": "Cloud Resource Updates (Certificate ID Unchanged) Retry Rollback Deployment Record - Retry Specified Failure Records"
|
|
357
|
+
}
|
|
358
|
+
],
|
|
359
|
+
"UploadUpdateCertificateRecordRollback": [
|
|
360
|
+
{
|
|
361
|
+
"document": "",
|
|
362
|
+
"input": "POST / HTTP/1.1\nHost: ssl.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: UploadUpdateCertificateRecordRollback\n<Common request parameters>\n\n{\n \"DeployRecordId\": 2\n}",
|
|
363
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"79b4dae4-51a7-4345-9b2b-0c6a29f69291\"\n }\n}",
|
|
364
|
+
"title": "Cloud Resource Updates Successful (Certificate ID Unchanged) Rollback History"
|
|
365
|
+
}
|
|
312
366
|
]
|
|
313
367
|
},
|
|
314
368
|
"version": "1.0"
|
tccli/services/ssm/ssm_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doDescribeRotationHistory(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDescribeRotationHistory(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doRotateProductSecret(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doRotateProductSecret(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doDeleteSecret(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doDeleteSecret(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doUpdateSecret(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doUpdateSecret(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doListSecrets(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doListSecrets(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doCreateSSHKeyPairSecret(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doCreateSSHKeyPairSecret(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doUpdateRotationStatus(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doUpdateRotationStatus(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doDescribeSupportedProducts(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doDescribeSupportedProducts(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doGetSecretValue(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doGetSecretValue(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +522,10 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,7 +537,7 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +577,10 @@ def doCreateProductSecret(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,7 +592,7 @@ def doCreateProductSecret(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +632,10 @@ def doDeleteSecretVersion(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,7 +647,7 @@ def doDeleteSecretVersion(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +687,10 @@ def doUpdateDescription(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,7 +702,7 @@ def doUpdateDescription(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +742,10 @@ def doPutSecretValue(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,7 +757,7 @@ def doPutSecretValue(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +797,10 @@ def doDescribeSecret(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,7 +812,7 @@ def doDescribeSecret(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +852,10 @@ def doDescribeRotationDetail(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,7 +867,7 @@ def doDescribeRotationDetail(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +907,10 @@ def doGetSSHKeyPairValue(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,7 +922,7 @@ def doGetSSHKeyPairValue(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +962,10 @@ def doListSecretVersionIds(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,7 +977,7 @@ def doListSecretVersionIds(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1017,10 @@ def doCreateSecret(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,7 +1032,7 @@ def doCreateSecret(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1072,10 @@ def doEnableSecret(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,7 +1087,7 @@ def doEnableSecret(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1127,10 @@ def doRestoreSecret(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,7 +1142,7 @@ def doRestoreSecret(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1119,7 +1182,10 @@ def doGetServiceStatus(args, parsed_globals):
|
|
|
1119
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1184
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1190
|
else:
|
|
1125
1191
|
cred = credential.Credential(
|
|
@@ -1131,7 +1197,7 @@ def doGetServiceStatus(args, parsed_globals):
|
|
|
1131
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1199
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1201
|
if g_param[OptionsDefine.Language]:
|
|
1136
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1237,10 @@ def doGetRegions(args, parsed_globals):
|
|
|
1171
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1239
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1245
|
else:
|
|
1177
1246
|
cred = credential.Credential(
|
|
@@ -1183,7 +1252,7 @@ def doGetRegions(args, parsed_globals):
|
|
|
1183
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1254
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1256
|
if g_param[OptionsDefine.Language]:
|
|
1188
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1292,10 @@ def doDisableSecret(args, parsed_globals):
|
|
|
1223
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1294
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1300
|
else:
|
|
1229
1301
|
cred = credential.Credential(
|
|
@@ -1235,7 +1307,7 @@ def doDisableSecret(args, parsed_globals):
|
|
|
1235
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1309
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1311
|
if g_param[OptionsDefine.Language]:
|
|
1240
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|