tccli-intl-en 3.0.1237.1__py2.py3-none-any.whl → 3.0.1282.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +17 -1
- tccli/services/advisor/advisor_client.py +8 -2
- tccli/services/aiart/aiart_client.py +4 -1
- tccli/services/ams/ams_client.py +16 -4
- tccli/services/antiddos/antiddos_client.py +280 -70
- tccli/services/apigateway/apigateway_client.py +372 -93
- tccli/services/apm/apm_client.py +52 -13
- tccli/services/asr/asr_client.py +8 -2
- tccli/services/autoscaling/autoscaling_client.py +232 -58
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/batch_client.py +112 -28
- tccli/services/bi/bi_client.py +1242 -4
- tccli/services/bi/v20220105/api.json +5340 -107
- tccli/services/bi/v20220105/examples.json +196 -1
- tccli/services/billing/billing_client.py +168 -42
- tccli/services/cam/cam_client.py +324 -81
- tccli/services/captcha/captcha_client.py +4 -1
- tccli/services/car/car_client.py +132 -33
- tccli/services/cbs/cbs_client.py +152 -38
- tccli/services/ccc/ccc_client.py +732 -98
- tccli/services/ccc/v20200210/api.json +1727 -196
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +532 -133
- tccli/services/cdc/cdc_client.py +80 -20
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +176 -44
- tccli/services/cdwdoris/cdwdoris_client.py +308 -77
- tccli/services/cdwpg/cdwpg_client.py +96 -24
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +64 -16
- tccli/services/cfs/cfs_client.py +156 -39
- tccli/services/cfw/cfw_client.py +264 -66
- tccli/services/chdfs/chdfs_client.py +116 -29
- tccli/services/ciam/ciam_client.py +64 -16
- tccli/services/ckafka/ckafka_client.py +575 -77
- tccli/services/ckafka/v20190819/api.json +2749 -1470
- tccli/services/ckafka/v20190819/examples.json +209 -155
- tccli/services/clb/clb_client.py +332 -83
- tccli/services/clb/v20180317/api.json +29 -14
- tccli/services/cloudaudit/cloudaudit_client.py +72 -18
- tccli/services/cls/cls_client.py +348 -87
- tccli/services/cmq/cmq_client.py +12 -801
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +24 -6
- tccli/services/controlcenter/controlcenter_client.py +4 -1
- tccli/services/csip/csip_client.py +136 -34
- tccli/services/ctsdb/ctsdb_client.py +8 -2
- tccli/services/cvm/cvm_client.py +627 -110
- tccli/services/cvm/v20170312/api.json +750 -340
- tccli/services/cvm/v20170312/examples.json +105 -59
- tccli/services/cwp/cwp_client.py +1860 -465
- tccli/services/cynosdb/cynosdb_client.py +1749 -439
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +4 -1
- tccli/services/dayu/dayu_client.py +412 -103
- tccli/services/dbbrain/dbbrain_client.py +168 -42
- tccli/services/dc/dc_client.py +72 -18
- tccli/services/dcdb/dcdb_client.py +248 -62
- tccli/services/dlc/dlc_client.py +756 -111
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +8 -2
- tccli/services/dnspod/dnspod_client.py +353 -74
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +96 -24
- tccli/services/dts/dts_client.py +332 -83
- tccli/services/eb/eb_client.py +104 -26
- tccli/services/ecdn/ecdn_client.py +60 -15
- tccli/services/ecm/ecm_client.py +496 -124
- tccli/services/eiam/eiam_client.py +160 -40
- tccli/services/emr/emr_client.py +2784 -115
- tccli/services/emr/v20190103/api.json +14647 -4756
- tccli/services/emr/v20190103/examples.json +408 -40
- tccli/services/es/es_client.py +84 -21
- tccli/services/facefusion/facefusion_client.py +12 -3
- tccli/services/faceid/faceid_client.py +76 -19
- tccli/services/faceid/v20180301/api.json +79 -14
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +352 -88
- tccli/services/gme/gme_client.py +40 -10
- tccli/services/gpm/gpm_client.py +72 -18
- tccli/services/gse/gse_client.py +88 -22
- tccli/services/gwlb/gwlb_client.py +72 -18
- tccli/services/iai/iai_client.py +116 -29
- tccli/services/iap/iap_client.py +24 -6
- tccli/services/ims/ims_client.py +4 -1
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +168 -42
- tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
- tccli/services/iotcloud/iotcloud_client.py +80 -20
- tccli/services/ip/ip_client.py +24 -6
- tccli/services/kms/kms_client.py +272 -68
- tccli/services/lcic/lcic_client.py +212 -53
- tccli/services/lighthouse/lighthouse_client.py +296 -74
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +480 -120
- tccli/services/lke/lke_client.py +360 -90
- tccli/services/lke/v20231130/api.json +182 -39
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +546 -0
- tccli/services/lkeap/v20240522/api.json +855 -0
- tccli/services/lkeap/v20240522/examples.json +72 -0
- tccli/services/mariadb/mariadb_client.py +200 -50
- tccli/services/mdc/mdc_client.py +72 -18
- tccli/services/mdl/mdl_client.py +132 -33
- tccli/services/mdl/v20200326/api.json +186 -12
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/mdp_client.py +680 -70
- tccli/services/mdp/v20200527/api.json +748 -23
- tccli/services/mdp/v20200527/examples.json +143 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +340 -29
- tccli/services/mongodb/v20190725/api.json +811 -226
- tccli/services/mongodb/v20190725/examples.json +54 -22
- tccli/services/monitor/monitor_client.py +864 -152
- tccli/services/monitor/v20180724/api.json +657 -8
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +592 -92
- tccli/services/mps/v20190612/api.json +2931 -399
- tccli/services/mps/v20190612/examples.json +64 -14
- tccli/services/msp/msp_client.py +28 -7
- tccli/services/ocr/ocr_client.py +212 -45
- tccli/services/ocr/v20181119/api.json +872 -112
- tccli/services/ocr/v20181119/examples.json +12 -4
- tccli/services/omics/omics_client.py +80 -20
- tccli/services/organization/organization_client.py +464 -116
- tccli/services/postgres/postgres_client.py +364 -91
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +124 -31
- tccli/services/pts/pts_client.py +192 -48
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +4 -1
- tccli/services/redis/redis_client.py +592 -106
- tccli/services/redis/v20180412/api.json +636 -240
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/region_client.py +12 -3
- tccli/services/rum/rum_client.py +240 -60
- tccli/services/scf/scf_client.py +168 -42
- tccli/services/ses/ses_client.py +116 -29
- tccli/services/sms/sms_client.py +72 -18
- tccli/services/sqlserver/sqlserver_client.py +3772 -387
- tccli/services/sqlserver/v20180328/api.json +9760 -3380
- tccli/services/sqlserver/v20180328/examples.json +478 -18
- tccli/services/ssl/ssl_client.py +152 -38
- tccli/services/ssm/ssm_client.py +96 -24
- tccli/services/sts/sts_client.py +20 -5
- tccli/services/tag/tag_client.py +120 -30
- tccli/services/tat/tat_client.py +76 -19
- tccli/services/tbaas/tbaas_client.py +16 -4
- tccli/services/tcaplusdb/tcaplusdb_client.py +208 -52
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +4 -1
- tccli/services/tcmpp/tcmpp_client.py +416 -104
- tccli/services/tcr/tcr_client.py +304 -76
- tccli/services/tcsas/tcsas_client.py +236 -59
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1320 -330
- tccli/services/tdid/tdid_client.py +192 -48
- tccli/services/tdmq/tdmq_client.py +376 -94
- tccli/services/tem/tem_client.py +224 -56
- tccli/services/teo/teo_client.py +1127 -245
- tccli/services/teo/v20220901/api.json +382 -58
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +204 -51
- tccli/services/tke/tke_client.py +552 -138
- tccli/services/tms/tms_client.py +4 -1
- tccli/services/tmt/tmt_client.py +4 -1
- tccli/services/trabbit/trabbit_client.py +116 -29
- tccli/services/trro/trro_client.py +76 -19
- tccli/services/trtc/trtc_client.py +420 -55
- tccli/services/trtc/v20190722/api.json +685 -23
- tccli/services/trtc/v20190722/examples.json +39 -7
- tccli/services/tts/tts_client.py +4 -1
- tccli/services/vclm/vclm_client.py +8 -2
- tccli/services/vm/vm_client.py +16 -4
- tccli/services/vod/v20180717/examples.json +1 -1
- tccli/services/vod/vod_client.py +716 -179
- tccli/services/vpc/v20170312/api.json +970 -75
- tccli/services/vpc/v20170312/examples.json +106 -10
- tccli/services/vpc/vpc_client.py +1876 -361
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1051 -147
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +5830 -1026
- tccli/services/yunjing/yunjing_client.py +284 -71
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/RECORD +214 -192
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/top_level.txt +0 -0
tccli/services/teo/teo_client.py
CHANGED
|
@@ -29,7 +29,10 @@ def doDestroyPlan(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -81,7 +84,10 @@ def doCreateDnsRecord(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -133,7 +139,10 @@ def doExportZoneConfig(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -185,7 +194,10 @@ def doDescribeContentIdentifiers(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -237,7 +249,10 @@ def doDeleteFunction(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -289,7 +304,10 @@ def doCreatePurgeTask(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -341,7 +359,10 @@ def doDescribeDDoSProtection(args, parsed_globals):
|
|
|
341
359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
361
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
367
|
else:
|
|
347
368
|
cred = credential.Credential(
|
|
@@ -393,7 +414,10 @@ def doDescribeMultiPathGatewayRegions(args, parsed_globals):
|
|
|
393
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
416
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
422
|
else:
|
|
399
423
|
cred = credential.Credential(
|
|
@@ -445,7 +469,10 @@ def doConfirmOriginACLUpdate(args, parsed_globals):
|
|
|
445
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
471
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
477
|
else:
|
|
451
478
|
cred = credential.Credential(
|
|
@@ -497,7 +524,10 @@ def doDownloadL4Logs(args, parsed_globals):
|
|
|
497
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
526
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
532
|
else:
|
|
503
533
|
cred = credential.Credential(
|
|
@@ -549,7 +579,10 @@ def doCreatePlanForZone(args, parsed_globals):
|
|
|
549
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
581
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
587
|
else:
|
|
555
588
|
cred = credential.Credential(
|
|
@@ -601,7 +634,10 @@ def doDescribeContentQuota(args, parsed_globals):
|
|
|
601
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
636
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
642
|
else:
|
|
607
643
|
cred = credential.Credential(
|
|
@@ -653,7 +689,10 @@ def doDescribeWebProtectionAttackEvents(args, parsed_globals):
|
|
|
653
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
691
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
697
|
else:
|
|
659
698
|
cred = credential.Credential(
|
|
@@ -705,7 +744,10 @@ def doCreateWebSecurityTemplate(args, parsed_globals):
|
|
|
705
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
746
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
752
|
else:
|
|
711
753
|
cred = credential.Credential(
|
|
@@ -757,7 +799,10 @@ def doDescribeRealtimeLogDeliveryTasks(args, parsed_globals):
|
|
|
757
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
801
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
807
|
else:
|
|
763
808
|
cred = credential.Credential(
|
|
@@ -809,7 +854,10 @@ def doVerifyOwnership(args, parsed_globals):
|
|
|
809
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
856
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
862
|
else:
|
|
815
863
|
cred = credential.Credential(
|
|
@@ -861,7 +909,10 @@ def doDescribeWebSecurityTemplate(args, parsed_globals):
|
|
|
861
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
911
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
917
|
else:
|
|
867
918
|
cred = credential.Credential(
|
|
@@ -913,7 +964,10 @@ def doCreateFunctionRule(args, parsed_globals):
|
|
|
913
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
966
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
972
|
else:
|
|
919
973
|
cred = credential.Credential(
|
|
@@ -965,7 +1019,10 @@ def doDeleteFunctionRules(args, parsed_globals):
|
|
|
965
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1021
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1027
|
else:
|
|
971
1028
|
cred = credential.Credential(
|
|
@@ -1017,7 +1074,10 @@ def doCreateLoadBalancing(args, parsed_globals):
|
|
|
1017
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1076
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1082
|
else:
|
|
1023
1083
|
cred = credential.Credential(
|
|
@@ -1069,7 +1129,10 @@ def doModifyDDoSPolicyHost(args, parsed_globals):
|
|
|
1069
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1131
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1137
|
else:
|
|
1075
1138
|
cred = credential.Credential(
|
|
@@ -1111,6 +1174,61 @@ def doModifyDDoSPolicyHost(args, parsed_globals):
|
|
|
1111
1174
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1112
1175
|
|
|
1113
1176
|
|
|
1177
|
+
def doModifyMultiPathGatewayStatus(args, parsed_globals):
|
|
1178
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1179
|
+
|
|
1180
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1181
|
+
cred = credential.CVMRoleCredential()
|
|
1182
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1183
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1184
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1185
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1186
|
+
)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1191
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1192
|
+
else:
|
|
1193
|
+
cred = credential.Credential(
|
|
1194
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1195
|
+
)
|
|
1196
|
+
http_profile = HttpProfile(
|
|
1197
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1198
|
+
reqMethod="POST",
|
|
1199
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1200
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1201
|
+
)
|
|
1202
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1203
|
+
if g_param[OptionsDefine.Language]:
|
|
1204
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1205
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1206
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1207
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1208
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1209
|
+
model = models.ModifyMultiPathGatewayStatusRequest()
|
|
1210
|
+
model.from_json_string(json.dumps(args))
|
|
1211
|
+
start_time = time.time()
|
|
1212
|
+
while True:
|
|
1213
|
+
rsp = client.ModifyMultiPathGatewayStatus(model)
|
|
1214
|
+
result = rsp.to_json_string()
|
|
1215
|
+
try:
|
|
1216
|
+
json_obj = json.loads(result)
|
|
1217
|
+
except TypeError as e:
|
|
1218
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1219
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1220
|
+
break
|
|
1221
|
+
cur_time = time.time()
|
|
1222
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1223
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1224
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1225
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1226
|
+
else:
|
|
1227
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1228
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1229
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1230
|
+
|
|
1231
|
+
|
|
1114
1232
|
def doIdentifyZone(args, parsed_globals):
|
|
1115
1233
|
g_param = parse_global_arg(parsed_globals)
|
|
1116
1234
|
|
|
@@ -1121,7 +1239,10 @@ def doIdentifyZone(args, parsed_globals):
|
|
|
1121
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1241
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1247
|
else:
|
|
1127
1248
|
cred = credential.Credential(
|
|
@@ -1173,7 +1294,10 @@ def doDescribeDefaultCertificates(args, parsed_globals):
|
|
|
1173
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1296
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1302
|
else:
|
|
1179
1303
|
cred = credential.Credential(
|
|
@@ -1225,7 +1349,10 @@ def doModifyL7AccRule(args, parsed_globals):
|
|
|
1225
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1351
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1357
|
else:
|
|
1231
1358
|
cred = credential.Credential(
|
|
@@ -1277,7 +1404,10 @@ def doCreateSecurityJSInjectionRule(args, parsed_globals):
|
|
|
1277
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1406
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1412
|
else:
|
|
1283
1413
|
cred = credential.Credential(
|
|
@@ -1329,7 +1459,10 @@ def doDescribeFunctionRuntimeEnvironment(args, parsed_globals):
|
|
|
1329
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1461
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1467
|
else:
|
|
1335
1468
|
cred = credential.Credential(
|
|
@@ -1381,7 +1514,10 @@ def doModifyOriginGroup(args, parsed_globals):
|
|
|
1381
1514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1516
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1522
|
else:
|
|
1387
1523
|
cred = credential.Credential(
|
|
@@ -1433,7 +1569,10 @@ def doDescribeDDosAttackTopData(args, parsed_globals):
|
|
|
1433
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1571
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1577
|
else:
|
|
1439
1578
|
cred = credential.Credential(
|
|
@@ -1485,7 +1624,10 @@ def doDeleteSecurityAPIResource(args, parsed_globals):
|
|
|
1485
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1626
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1632
|
else:
|
|
1491
1633
|
cred = credential.Credential(
|
|
@@ -1537,7 +1679,10 @@ def doDeleteApplicationProxy(args, parsed_globals):
|
|
|
1537
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1681
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1687
|
else:
|
|
1543
1688
|
cred = credential.Credential(
|
|
@@ -1589,7 +1734,10 @@ def doModifyL7AccSetting(args, parsed_globals):
|
|
|
1589
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1736
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1742
|
else:
|
|
1595
1743
|
cred = credential.Credential(
|
|
@@ -1641,7 +1789,10 @@ def doCreateSecurityAPIResource(args, parsed_globals):
|
|
|
1641
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1791
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1797
|
else:
|
|
1647
1798
|
cred = credential.Credential(
|
|
@@ -1693,7 +1844,10 @@ def doDescribeConfigGroupVersions(args, parsed_globals):
|
|
|
1693
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1846
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1852
|
else:
|
|
1699
1853
|
cred = credential.Credential(
|
|
@@ -1745,7 +1899,10 @@ def doModifyL4ProxyStatus(args, parsed_globals):
|
|
|
1745
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1901
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1907
|
else:
|
|
1751
1908
|
cred = credential.Credential(
|
|
@@ -1797,7 +1954,10 @@ def doDownloadL7Logs(args, parsed_globals):
|
|
|
1797
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
1956
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
1962
|
else:
|
|
1803
1963
|
cred = credential.Credential(
|
|
@@ -1849,7 +2009,10 @@ def doDescribeEnvironments(args, parsed_globals):
|
|
|
1849
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
2011
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
2017
|
else:
|
|
1855
2018
|
cred = credential.Credential(
|
|
@@ -1901,7 +2064,10 @@ def doDescribeOriginACL(args, parsed_globals):
|
|
|
1901
2064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2066
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2072
|
else:
|
|
1907
2073
|
cred = credential.Credential(
|
|
@@ -1953,7 +2119,10 @@ def doDeleteApplicationProxyRule(args, parsed_globals):
|
|
|
1953
2119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1954
2120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1955
2121
|
)
|
|
1956
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1957
2126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1958
2127
|
else:
|
|
1959
2128
|
cred = credential.Credential(
|
|
@@ -2005,7 +2174,10 @@ def doCheckCnameStatus(args, parsed_globals):
|
|
|
2005
2174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2006
2175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2007
2176
|
)
|
|
2008
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2009
2181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2010
2182
|
else:
|
|
2011
2183
|
cred = credential.Credential(
|
|
@@ -2057,7 +2229,10 @@ def doDescribeWebProtectionData(args, parsed_globals):
|
|
|
2057
2229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2058
2230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2059
2231
|
)
|
|
2060
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2061
2236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2062
2237
|
else:
|
|
2063
2238
|
cred = credential.Credential(
|
|
@@ -2109,7 +2284,10 @@ def doDescribeWebManagedRulesAttackEvents(args, parsed_globals):
|
|
|
2109
2284
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2110
2285
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2111
2286
|
)
|
|
2112
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2287
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2289
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2290
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2113
2291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2114
2292
|
else:
|
|
2115
2293
|
cred = credential.Credential(
|
|
@@ -2161,7 +2339,10 @@ def doCreateMultiPathGateway(args, parsed_globals):
|
|
|
2161
2339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2162
2340
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2163
2341
|
)
|
|
2164
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2344
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2345
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2165
2346
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2166
2347
|
else:
|
|
2167
2348
|
cred = credential.Credential(
|
|
@@ -2213,7 +2394,10 @@ def doCreatePrefetchTask(args, parsed_globals):
|
|
|
2213
2394
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2214
2395
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2215
2396
|
)
|
|
2216
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2397
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2399
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2400
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2217
2401
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2218
2402
|
else:
|
|
2219
2403
|
cred = credential.Credential(
|
|
@@ -2265,7 +2449,10 @@ def doDeleteAliasDomain(args, parsed_globals):
|
|
|
2265
2449
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2266
2450
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2267
2451
|
)
|
|
2268
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2452
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2454
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2455
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2269
2456
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2270
2457
|
else:
|
|
2271
2458
|
cred = credential.Credential(
|
|
@@ -2317,7 +2504,10 @@ def doDescribeOverviewL7Data(args, parsed_globals):
|
|
|
2317
2504
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2318
2505
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2319
2506
|
)
|
|
2320
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2507
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2509
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2510
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2321
2511
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2322
2512
|
else:
|
|
2323
2513
|
cred = credential.Credential(
|
|
@@ -2369,7 +2559,10 @@ def doCreateAccelerationDomain(args, parsed_globals):
|
|
|
2369
2559
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2370
2560
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2371
2561
|
)
|
|
2372
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2562
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2564
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2565
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2373
2566
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2374
2567
|
else:
|
|
2375
2568
|
cred = credential.Credential(
|
|
@@ -2421,7 +2614,10 @@ def doCheckCertificate(args, parsed_globals):
|
|
|
2421
2614
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2422
2615
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2423
2616
|
)
|
|
2424
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2617
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2619
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2620
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2425
2621
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2426
2622
|
else:
|
|
2427
2623
|
cred = credential.Credential(
|
|
@@ -2473,7 +2669,10 @@ def doCreateMultiPathGatewayLine(args, parsed_globals):
|
|
|
2473
2669
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2474
2670
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2475
2671
|
)
|
|
2476
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2672
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2674
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2675
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2477
2676
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2478
2677
|
else:
|
|
2479
2678
|
cred = credential.Credential(
|
|
@@ -2525,7 +2724,10 @@ def doDescribeSecurityPolicyManagedRules(args, parsed_globals):
|
|
|
2525
2724
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2526
2725
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2527
2726
|
)
|
|
2528
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2727
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2729
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2730
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2529
2731
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2530
2732
|
else:
|
|
2531
2733
|
cred = credential.Credential(
|
|
@@ -2577,7 +2779,10 @@ def doDescribeCnameStatus(args, parsed_globals):
|
|
|
2577
2779
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2578
2780
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2579
2781
|
)
|
|
2580
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2782
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2784
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2785
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2581
2786
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2582
2787
|
else:
|
|
2583
2788
|
cred = credential.Credential(
|
|
@@ -2629,7 +2834,10 @@ def doDescribeZones(args, parsed_globals):
|
|
|
2629
2834
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2630
2835
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2631
2836
|
)
|
|
2632
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2837
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2839
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2840
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2633
2841
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2634
2842
|
else:
|
|
2635
2843
|
cred = credential.Credential(
|
|
@@ -2681,7 +2889,10 @@ def doDescribeZoneDetails(args, parsed_globals):
|
|
|
2681
2889
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2682
2890
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2683
2891
|
)
|
|
2684
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2892
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2894
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2895
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2685
2896
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2686
2897
|
else:
|
|
2687
2898
|
cred = credential.Credential(
|
|
@@ -2733,7 +2944,10 @@ def doModifyDDoSPolicy(args, parsed_globals):
|
|
|
2733
2944
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2734
2945
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2735
2946
|
)
|
|
2736
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2947
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2949
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2950
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2737
2951
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2738
2952
|
else:
|
|
2739
2953
|
cred = credential.Credential(
|
|
@@ -2785,7 +2999,10 @@ def doDescribeConfigGroupVersionDetail(args, parsed_globals):
|
|
|
2785
2999
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2786
3000
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2787
3001
|
)
|
|
2788
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3002
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3004
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3005
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2789
3006
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2790
3007
|
else:
|
|
2791
3008
|
cred = credential.Credential(
|
|
@@ -2837,7 +3054,10 @@ def doDescribeL7AccRules(args, parsed_globals):
|
|
|
2837
3054
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2838
3055
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2839
3056
|
)
|
|
2840
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3057
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3059
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3060
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
3061
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
3062
|
else:
|
|
2843
3063
|
cred = credential.Credential(
|
|
@@ -2889,7 +3109,10 @@ def doBindSecurityTemplateToEntity(args, parsed_globals):
|
|
|
2889
3109
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2890
3110
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2891
3111
|
)
|
|
2892
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3112
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3114
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3115
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2893
3116
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2894
3117
|
else:
|
|
2895
3118
|
cred = credential.Credential(
|
|
@@ -2941,7 +3164,10 @@ def doModifyOriginACL(args, parsed_globals):
|
|
|
2941
3164
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2942
3165
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2943
3166
|
)
|
|
2944
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3167
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3169
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3170
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2945
3171
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2946
3172
|
else:
|
|
2947
3173
|
cred = credential.Credential(
|
|
@@ -2993,7 +3219,10 @@ def doModifyApplicationProxyRuleStatus(args, parsed_globals):
|
|
|
2993
3219
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2994
3220
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2995
3221
|
)
|
|
2996
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3222
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3224
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3225
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2997
3226
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2998
3227
|
else:
|
|
2999
3228
|
cred = credential.Credential(
|
|
@@ -3045,7 +3274,10 @@ def doDescribeSecurityPolicyList(args, parsed_globals):
|
|
|
3045
3274
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3046
3275
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3047
3276
|
)
|
|
3048
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3277
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3279
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3280
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3049
3281
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3050
3282
|
else:
|
|
3051
3283
|
cred = credential.Credential(
|
|
@@ -3097,7 +3329,10 @@ def doDescribePrefetchTasks(args, parsed_globals):
|
|
|
3097
3329
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3098
3330
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3099
3331
|
)
|
|
3100
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3332
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3334
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3335
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3101
3336
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3102
3337
|
else:
|
|
3103
3338
|
cred = credential.Credential(
|
|
@@ -3149,7 +3384,10 @@ def doDeleteOriginGroup(args, parsed_globals):
|
|
|
3149
3384
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3150
3385
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3151
3386
|
)
|
|
3152
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3387
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3389
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3390
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3153
3391
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3154
3392
|
else:
|
|
3155
3393
|
cred = credential.Credential(
|
|
@@ -3201,7 +3439,10 @@ def doDescribeWebManagedRulesTopData(args, parsed_globals):
|
|
|
3201
3439
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3202
3440
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3203
3441
|
)
|
|
3204
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3442
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3444
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3445
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3205
3446
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3206
3447
|
else:
|
|
3207
3448
|
cred = credential.Credential(
|
|
@@ -3253,7 +3494,10 @@ def doCreateApplicationProxyRules(args, parsed_globals):
|
|
|
3253
3494
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3254
3495
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3255
3496
|
)
|
|
3256
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3497
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3499
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3500
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3257
3501
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3258
3502
|
else:
|
|
3259
3503
|
cred = credential.Credential(
|
|
@@ -3305,7 +3549,10 @@ def doDescribeLoadBalancerList(args, parsed_globals):
|
|
|
3305
3549
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3306
3550
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3307
3551
|
)
|
|
3308
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3552
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3554
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3555
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3309
3556
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3310
3557
|
else:
|
|
3311
3558
|
cred = credential.Credential(
|
|
@@ -3357,7 +3604,10 @@ def doDescribeApplicationProxy(args, parsed_globals):
|
|
|
3357
3604
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3358
3605
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3359
3606
|
)
|
|
3360
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3607
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3609
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3610
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3361
3611
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3362
3612
|
else:
|
|
3363
3613
|
cred = credential.Credential(
|
|
@@ -3409,7 +3659,10 @@ def doCreateSecurityIPGroup(args, parsed_globals):
|
|
|
3409
3659
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3410
3660
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3411
3661
|
)
|
|
3412
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3662
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3664
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3665
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3413
3666
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3414
3667
|
else:
|
|
3415
3668
|
cred = credential.Credential(
|
|
@@ -3461,7 +3714,10 @@ def doDescribeIPRegion(args, parsed_globals):
|
|
|
3461
3714
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3462
3715
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3463
3716
|
)
|
|
3464
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3717
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3719
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3720
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3465
3721
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3466
3722
|
else:
|
|
3467
3723
|
cred = credential.Credential(
|
|
@@ -3513,7 +3769,10 @@ def doDescribeAccelerationDomains(args, parsed_globals):
|
|
|
3513
3769
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3514
3770
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3515
3771
|
)
|
|
3516
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3772
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3774
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3775
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3517
3776
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3518
3777
|
else:
|
|
3519
3778
|
cred = credential.Credential(
|
|
@@ -3565,7 +3824,10 @@ def doDeleteAccelerationDomains(args, parsed_globals):
|
|
|
3565
3824
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3566
3825
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3567
3826
|
)
|
|
3568
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3827
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3829
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3830
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3569
3831
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3570
3832
|
else:
|
|
3571
3833
|
cred = credential.Credential(
|
|
@@ -3617,7 +3879,10 @@ def doDeleteSecurityJSInjectionRule(args, parsed_globals):
|
|
|
3617
3879
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3618
3880
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3619
3881
|
)
|
|
3620
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3882
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3884
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3885
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3621
3886
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3622
3887
|
else:
|
|
3623
3888
|
cred = credential.Credential(
|
|
@@ -3669,7 +3934,10 @@ def doRefreshMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
3669
3934
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3670
3935
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3671
3936
|
)
|
|
3672
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3937
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3939
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3940
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3673
3941
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3674
3942
|
else:
|
|
3675
3943
|
cred = credential.Credential(
|
|
@@ -3721,7 +3989,10 @@ def doCreateRealtimeLogDeliveryTask(args, parsed_globals):
|
|
|
3721
3989
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3722
3990
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3723
3991
|
)
|
|
3724
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3992
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3994
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3995
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3725
3996
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3726
3997
|
else:
|
|
3727
3998
|
cred = credential.Credential(
|
|
@@ -3773,7 +4044,10 @@ def doModifyL4Proxy(args, parsed_globals):
|
|
|
3773
4044
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3774
4045
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3775
4046
|
)
|
|
3776
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4047
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4049
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4050
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3777
4051
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3778
4052
|
else:
|
|
3779
4053
|
cred = credential.Credential(
|
|
@@ -3825,7 +4099,10 @@ def doModifyL4ProxyRules(args, parsed_globals):
|
|
|
3825
4099
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3826
4100
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3827
4101
|
)
|
|
3828
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3829
4106
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3830
4107
|
else:
|
|
3831
4108
|
cred = credential.Credential(
|
|
@@ -3877,7 +4154,10 @@ def doDescribeIdentifications(args, parsed_globals):
|
|
|
3877
4154
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3878
4155
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3879
4156
|
)
|
|
3880
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4157
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4159
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4160
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3881
4161
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3882
4162
|
else:
|
|
3883
4163
|
cred = credential.Credential(
|
|
@@ -3929,7 +4209,10 @@ def doDescribeDDosAttackEventDetail(args, parsed_globals):
|
|
|
3929
4209
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3930
4210
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3931
4211
|
)
|
|
3932
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4212
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4214
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4215
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3933
4216
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3934
4217
|
else:
|
|
3935
4218
|
cred = credential.Credential(
|
|
@@ -3981,7 +4264,10 @@ def doModifyDnsRecords(args, parsed_globals):
|
|
|
3981
4264
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3982
4265
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3983
4266
|
)
|
|
3984
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4267
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4269
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4270
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3985
4271
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3986
4272
|
else:
|
|
3987
4273
|
cred = credential.Credential(
|
|
@@ -4033,7 +4319,10 @@ def doDescribeTimingL7CacheData(args, parsed_globals):
|
|
|
4033
4319
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4034
4320
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4035
4321
|
)
|
|
4036
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4322
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4324
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4325
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4037
4326
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4038
4327
|
else:
|
|
4039
4328
|
cred = credential.Credential(
|
|
@@ -4085,7 +4374,10 @@ def doDescribeLoadBalancing(args, parsed_globals):
|
|
|
4085
4374
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4086
4375
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4087
4376
|
)
|
|
4088
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4377
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4379
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4380
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4089
4381
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4090
4382
|
else:
|
|
4091
4383
|
cred = credential.Credential(
|
|
@@ -4137,7 +4429,10 @@ def doModifyFunctionRule(args, parsed_globals):
|
|
|
4137
4429
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4138
4430
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4139
4431
|
)
|
|
4140
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4432
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4434
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4435
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4141
4436
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4142
4437
|
else:
|
|
4143
4438
|
cred = credential.Credential(
|
|
@@ -4189,7 +4484,10 @@ def doModifyMultiPathGatewayLine(args, parsed_globals):
|
|
|
4189
4484
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4190
4485
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4191
4486
|
)
|
|
4192
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4487
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4489
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4490
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4193
4491
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4194
4492
|
else:
|
|
4195
4493
|
cred = credential.Credential(
|
|
@@ -4241,7 +4539,10 @@ def doModifyWebSecurityTemplate(args, parsed_globals):
|
|
|
4241
4539
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4242
4540
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4243
4541
|
)
|
|
4244
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4542
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4544
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4545
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4245
4546
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4246
4547
|
else:
|
|
4247
4548
|
cred = credential.Credential(
|
|
@@ -4293,7 +4594,10 @@ def doDescribeSecurityIPGroupContent(args, parsed_globals):
|
|
|
4293
4594
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4294
4595
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4295
4596
|
)
|
|
4296
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4597
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4599
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4600
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4297
4601
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4298
4602
|
else:
|
|
4299
4603
|
cred = credential.Credential(
|
|
@@ -4345,7 +4649,10 @@ def doModifyL7AccRulePriority(args, parsed_globals):
|
|
|
4345
4649
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4346
4650
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4347
4651
|
)
|
|
4348
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4652
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4654
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4655
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4349
4656
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4350
4657
|
else:
|
|
4351
4658
|
cred = credential.Credential(
|
|
@@ -4397,7 +4704,10 @@ def doModifyZoneSetting(args, parsed_globals):
|
|
|
4397
4704
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4398
4705
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4399
4706
|
)
|
|
4400
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4707
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4709
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4710
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4401
4711
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4402
4712
|
else:
|
|
4403
4713
|
cred = credential.Credential(
|
|
@@ -4449,7 +4759,10 @@ def doDescribeDDoSPolicy(args, parsed_globals):
|
|
|
4449
4759
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4450
4760
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4451
4761
|
)
|
|
4452
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4762
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4764
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4765
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4453
4766
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4454
4767
|
else:
|
|
4455
4768
|
cred = credential.Credential(
|
|
@@ -4501,7 +4814,10 @@ def doCreateAliasDomain(args, parsed_globals):
|
|
|
4501
4814
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4502
4815
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4503
4816
|
)
|
|
4504
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4817
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4819
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4820
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4505
4821
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4506
4822
|
else:
|
|
4507
4823
|
cred = credential.Credential(
|
|
@@ -4553,7 +4869,10 @@ def doModifyAliasDomainStatus(args, parsed_globals):
|
|
|
4553
4869
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4554
4870
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4555
4871
|
)
|
|
4556
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4872
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4874
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4875
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4557
4876
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4558
4877
|
else:
|
|
4559
4878
|
cred = credential.Credential(
|
|
@@ -4605,7 +4924,10 @@ def doDescribeSecurityIPGroup(args, parsed_globals):
|
|
|
4605
4924
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4606
4925
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4607
4926
|
)
|
|
4608
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4927
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4929
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4930
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4609
4931
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4610
4932
|
else:
|
|
4611
4933
|
cred = credential.Credential(
|
|
@@ -4657,7 +4979,10 @@ def doCreateL4ProxyRules(args, parsed_globals):
|
|
|
4657
4979
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4658
4980
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4659
4981
|
)
|
|
4660
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4982
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4984
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4985
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4661
4986
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4662
4987
|
else:
|
|
4663
4988
|
cred = credential.Credential(
|
|
@@ -4709,7 +5034,10 @@ def doDescribeOriginGroup(args, parsed_globals):
|
|
|
4709
5034
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4710
5035
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4711
5036
|
)
|
|
4712
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5037
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5039
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5040
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4713
5041
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4714
5042
|
else:
|
|
4715
5043
|
cred = credential.Credential(
|
|
@@ -4751,7 +5079,7 @@ def doDescribeOriginGroup(args, parsed_globals):
|
|
|
4751
5079
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4752
5080
|
|
|
4753
5081
|
|
|
4754
|
-
def
|
|
5082
|
+
def doDescribeTimingL4Data(args, parsed_globals):
|
|
4755
5083
|
g_param = parse_global_arg(parsed_globals)
|
|
4756
5084
|
|
|
4757
5085
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4761,7 +5089,10 @@ def doDescribeTopL7CacheData(args, parsed_globals):
|
|
|
4761
5089
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4762
5090
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4763
5091
|
)
|
|
4764
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5092
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5094
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5095
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4765
5096
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4766
5097
|
else:
|
|
4767
5098
|
cred = credential.Credential(
|
|
@@ -4780,11 +5111,11 @@ def doDescribeTopL7CacheData(args, parsed_globals):
|
|
|
4780
5111
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4781
5112
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4782
5113
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4783
|
-
model = models.
|
|
5114
|
+
model = models.DescribeTimingL4DataRequest()
|
|
4784
5115
|
model.from_json_string(json.dumps(args))
|
|
4785
5116
|
start_time = time.time()
|
|
4786
5117
|
while True:
|
|
4787
|
-
rsp = client.
|
|
5118
|
+
rsp = client.DescribeTimingL4Data(model)
|
|
4788
5119
|
result = rsp.to_json_string()
|
|
4789
5120
|
try:
|
|
4790
5121
|
json_obj = json.loads(result)
|
|
@@ -4803,7 +5134,7 @@ def doDescribeTopL7CacheData(args, parsed_globals):
|
|
|
4803
5134
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4804
5135
|
|
|
4805
5136
|
|
|
4806
|
-
def
|
|
5137
|
+
def doDescribeTopL7CacheData(args, parsed_globals):
|
|
4807
5138
|
g_param = parse_global_arg(parsed_globals)
|
|
4808
5139
|
|
|
4809
5140
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4813,7 +5144,10 @@ def doDescribeTimingL4Data(args, parsed_globals):
|
|
|
4813
5144
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4814
5145
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4815
5146
|
)
|
|
4816
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5147
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5149
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5150
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4817
5151
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4818
5152
|
else:
|
|
4819
5153
|
cred = credential.Credential(
|
|
@@ -4832,11 +5166,11 @@ def doDescribeTimingL4Data(args, parsed_globals):
|
|
|
4832
5166
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4833
5167
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4834
5168
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4835
|
-
model = models.
|
|
5169
|
+
model = models.DescribeTopL7CacheDataRequest()
|
|
4836
5170
|
model.from_json_string(json.dumps(args))
|
|
4837
5171
|
start_time = time.time()
|
|
4838
5172
|
while True:
|
|
4839
|
-
rsp = client.
|
|
5173
|
+
rsp = client.DescribeTopL7CacheData(model)
|
|
4840
5174
|
result = rsp.to_json_string()
|
|
4841
5175
|
try:
|
|
4842
5176
|
json_obj = json.loads(result)
|
|
@@ -4865,7 +5199,10 @@ def doScanDnsRecords(args, parsed_globals):
|
|
|
4865
5199
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4866
5200
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4867
5201
|
)
|
|
4868
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5202
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5204
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5205
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4869
5206
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4870
5207
|
else:
|
|
4871
5208
|
cred = credential.Credential(
|
|
@@ -4917,7 +5254,10 @@ def doModifyRule(args, parsed_globals):
|
|
|
4917
5254
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4918
5255
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4919
5256
|
)
|
|
4920
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5257
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5259
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5260
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4921
5261
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4922
5262
|
else:
|
|
4923
5263
|
cred = credential.Credential(
|
|
@@ -4969,7 +5309,10 @@ def doDescribeMultiPathGateways(args, parsed_globals):
|
|
|
4969
5309
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4970
5310
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4971
5311
|
)
|
|
4972
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5312
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5314
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5315
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4973
5316
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4974
5317
|
else:
|
|
4975
5318
|
cred = credential.Credential(
|
|
@@ -5021,7 +5364,10 @@ def doDescribeTopL7AnalysisData(args, parsed_globals):
|
|
|
5021
5364
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5022
5365
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5023
5366
|
)
|
|
5024
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5367
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5369
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5370
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5025
5371
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5026
5372
|
else:
|
|
5027
5373
|
cred = credential.Credential(
|
|
@@ -5073,7 +5419,10 @@ def doDescribeBotLog(args, parsed_globals):
|
|
|
5073
5419
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5074
5420
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5075
5421
|
)
|
|
5076
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5422
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5424
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5425
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5077
5426
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5078
5427
|
else:
|
|
5079
5428
|
cred = credential.Credential(
|
|
@@ -5125,7 +5474,10 @@ def doDeleteDnsRecords(args, parsed_globals):
|
|
|
5125
5474
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5126
5475
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5127
5476
|
)
|
|
5128
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5477
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5479
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5480
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5129
5481
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5130
5482
|
else:
|
|
5131
5483
|
cred = credential.Credential(
|
|
@@ -5177,7 +5529,10 @@ def doDescribeSecurityClientAttester(args, parsed_globals):
|
|
|
5177
5529
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5178
5530
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5179
5531
|
)
|
|
5180
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5532
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5534
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5535
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5181
5536
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5182
5537
|
else:
|
|
5183
5538
|
cred = credential.Credential(
|
|
@@ -5229,7 +5584,10 @@ def doModifySecurityPolicy(args, parsed_globals):
|
|
|
5229
5584
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5230
5585
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5231
5586
|
)
|
|
5232
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5587
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5589
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5590
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5233
5591
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5234
5592
|
else:
|
|
5235
5593
|
cred = credential.Credential(
|
|
@@ -5281,7 +5639,10 @@ def doDescribeMultiPathGatewayLine(args, parsed_globals):
|
|
|
5281
5639
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5282
5640
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5283
5641
|
)
|
|
5284
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5642
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5644
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5645
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5285
5646
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5286
5647
|
else:
|
|
5287
5648
|
cred = credential.Credential(
|
|
@@ -5333,7 +5694,10 @@ def doDeleteL7AccRules(args, parsed_globals):
|
|
|
5333
5694
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5334
5695
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5335
5696
|
)
|
|
5336
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5697
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5699
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5700
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5337
5701
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5338
5702
|
else:
|
|
5339
5703
|
cred = credential.Credential(
|
|
@@ -5385,7 +5749,10 @@ def doBindZoneToPlan(args, parsed_globals):
|
|
|
5385
5749
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5386
5750
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5387
5751
|
)
|
|
5388
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5752
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5754
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5755
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5389
5756
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5390
5757
|
else:
|
|
5391
5758
|
cred = credential.Credential(
|
|
@@ -5437,7 +5804,10 @@ def doDescribeDDoSAttackEvent(args, parsed_globals):
|
|
|
5437
5804
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5438
5805
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5439
5806
|
)
|
|
5440
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5807
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5809
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5810
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5441
5811
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5442
5812
|
else:
|
|
5443
5813
|
cred = credential.Credential(
|
|
@@ -5489,7 +5859,10 @@ def doDeleteL4ProxyRules(args, parsed_globals):
|
|
|
5489
5859
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5490
5860
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5491
5861
|
)
|
|
5492
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5862
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5864
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5865
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5493
5866
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5494
5867
|
else:
|
|
5495
5868
|
cred = credential.Credential(
|
|
@@ -5541,7 +5914,10 @@ def doDescribeSecurityPolicyRegions(args, parsed_globals):
|
|
|
5541
5914
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5542
5915
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5543
5916
|
)
|
|
5544
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5917
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5919
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5920
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5545
5921
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5546
5922
|
else:
|
|
5547
5923
|
cred = credential.Credential(
|
|
@@ -5593,7 +5969,10 @@ def doCreateCustomizeErrorPage(args, parsed_globals):
|
|
|
5593
5969
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5594
5970
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5595
5971
|
)
|
|
5596
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5972
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5974
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5975
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5597
5976
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5598
5977
|
else:
|
|
5599
5978
|
cred = credential.Credential(
|
|
@@ -5645,7 +6024,10 @@ def doDescribeBotManagedRules(args, parsed_globals):
|
|
|
5645
6024
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5646
6025
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5647
6026
|
)
|
|
5648
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6027
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6028
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6029
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6030
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5649
6031
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5650
6032
|
else:
|
|
5651
6033
|
cred = credential.Credential(
|
|
@@ -5697,7 +6079,10 @@ def doModifyAccelerationDomain(args, parsed_globals):
|
|
|
5697
6079
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5698
6080
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5699
6081
|
)
|
|
5700
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6082
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6083
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6084
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6085
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5701
6086
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5702
6087
|
else:
|
|
5703
6088
|
cred = credential.Credential(
|
|
@@ -5749,7 +6134,10 @@ def doCreateL4Proxy(args, parsed_globals):
|
|
|
5749
6134
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5750
6135
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5751
6136
|
)
|
|
5752
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6137
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6138
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6139
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6140
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5753
6141
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5754
6142
|
else:
|
|
5755
6143
|
cred = credential.Credential(
|
|
@@ -5801,7 +6189,10 @@ def doDescribeDDosAttackSourceEvent(args, parsed_globals):
|
|
|
5801
6189
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5802
6190
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5803
6191
|
)
|
|
5804
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6192
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6193
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6194
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6195
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5805
6196
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5806
6197
|
else:
|
|
5807
6198
|
cred = credential.Credential(
|
|
@@ -5853,7 +6244,10 @@ def doIncreasePlanQuota(args, parsed_globals):
|
|
|
5853
6244
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5854
6245
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5855
6246
|
)
|
|
5856
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6247
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6248
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6249
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6250
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5857
6251
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5858
6252
|
else:
|
|
5859
6253
|
cred = credential.Credential(
|
|
@@ -5905,7 +6299,10 @@ def doModifySecurityAPIResource(args, parsed_globals):
|
|
|
5905
6299
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5906
6300
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5907
6301
|
)
|
|
5908
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6302
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6303
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6304
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6305
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5909
6306
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5910
6307
|
else:
|
|
5911
6308
|
cred = credential.Credential(
|
|
@@ -5957,7 +6354,10 @@ def doModifyApplicationProxyStatus(args, parsed_globals):
|
|
|
5957
6354
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5958
6355
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5959
6356
|
)
|
|
5960
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6357
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6358
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6359
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6360
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5961
6361
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5962
6362
|
else:
|
|
5963
6363
|
cred = credential.Credential(
|
|
@@ -6009,7 +6409,10 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
|
6009
6409
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6010
6410
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6011
6411
|
)
|
|
6012
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6412
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6413
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6414
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6415
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6013
6416
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6014
6417
|
else:
|
|
6015
6418
|
cred = credential.Credential(
|
|
@@ -6061,7 +6464,10 @@ def doDescribeTimingL7AnalysisData(args, parsed_globals):
|
|
|
6061
6464
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6062
6465
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6063
6466
|
)
|
|
6064
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6467
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6468
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6469
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6470
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6065
6471
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6066
6472
|
else:
|
|
6067
6473
|
cred = credential.Credential(
|
|
@@ -6113,7 +6519,10 @@ def doCreateFunction(args, parsed_globals):
|
|
|
6113
6519
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6114
6520
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6115
6521
|
)
|
|
6116
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6522
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6523
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6524
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6525
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6117
6526
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6118
6527
|
else:
|
|
6119
6528
|
cred = credential.Credential(
|
|
@@ -6165,7 +6574,10 @@ def doDescribeApplicationProxies(args, parsed_globals):
|
|
|
6165
6574
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6166
6575
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6167
6576
|
)
|
|
6168
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6577
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6578
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6579
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6580
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6169
6581
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6170
6582
|
else:
|
|
6171
6583
|
cred = credential.Credential(
|
|
@@ -6217,7 +6629,10 @@ def doDescribeIdentification(args, parsed_globals):
|
|
|
6217
6629
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6218
6630
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6219
6631
|
)
|
|
6220
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6632
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6633
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6634
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6635
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6221
6636
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6222
6637
|
else:
|
|
6223
6638
|
cred = credential.Credential(
|
|
@@ -6269,7 +6684,10 @@ def doModifyMultiPathGateway(args, parsed_globals):
|
|
|
6269
6684
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6270
6685
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6271
6686
|
)
|
|
6272
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6687
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6688
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6689
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6690
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6273
6691
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6274
6692
|
else:
|
|
6275
6693
|
cred = credential.Credential(
|
|
@@ -6321,7 +6739,10 @@ def doCreateSharedCNAME(args, parsed_globals):
|
|
|
6321
6739
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6322
6740
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6323
6741
|
)
|
|
6324
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6742
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6743
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6744
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6745
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6325
6746
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6326
6747
|
else:
|
|
6327
6748
|
cred = credential.Credential(
|
|
@@ -6373,7 +6794,10 @@ def doDescribeDnssec(args, parsed_globals):
|
|
|
6373
6794
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6374
6795
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6375
6796
|
)
|
|
6376
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6797
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6798
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6799
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6800
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6377
6801
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6378
6802
|
else:
|
|
6379
6803
|
cred = credential.Credential(
|
|
@@ -6415,6 +6839,61 @@ def doDescribeDnssec(args, parsed_globals):
|
|
|
6415
6839
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6416
6840
|
|
|
6417
6841
|
|
|
6842
|
+
def doConfirmMultiPathGatewayOriginACL(args, parsed_globals):
|
|
6843
|
+
g_param = parse_global_arg(parsed_globals)
|
|
6844
|
+
|
|
6845
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
6846
|
+
cred = credential.CVMRoleCredential()
|
|
6847
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
6848
|
+
cred = credential.STSAssumeRoleCredential(
|
|
6849
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6850
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6851
|
+
)
|
|
6852
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6853
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6854
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6855
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6856
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6857
|
+
else:
|
|
6858
|
+
cred = credential.Credential(
|
|
6859
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
6860
|
+
)
|
|
6861
|
+
http_profile = HttpProfile(
|
|
6862
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
6863
|
+
reqMethod="POST",
|
|
6864
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6865
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6866
|
+
)
|
|
6867
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
6868
|
+
if g_param[OptionsDefine.Language]:
|
|
6869
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
6870
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
6871
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
6872
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
6873
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
6874
|
+
model = models.ConfirmMultiPathGatewayOriginACLRequest()
|
|
6875
|
+
model.from_json_string(json.dumps(args))
|
|
6876
|
+
start_time = time.time()
|
|
6877
|
+
while True:
|
|
6878
|
+
rsp = client.ConfirmMultiPathGatewayOriginACL(model)
|
|
6879
|
+
result = rsp.to_json_string()
|
|
6880
|
+
try:
|
|
6881
|
+
json_obj = json.loads(result)
|
|
6882
|
+
except TypeError as e:
|
|
6883
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
6884
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
6885
|
+
break
|
|
6886
|
+
cur_time = time.time()
|
|
6887
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
6888
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
6889
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
6890
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
6891
|
+
else:
|
|
6892
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
6893
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
6894
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6895
|
+
|
|
6896
|
+
|
|
6418
6897
|
def doDescribeSecurityJSInjectionRule(args, parsed_globals):
|
|
6419
6898
|
g_param = parse_global_arg(parsed_globals)
|
|
6420
6899
|
|
|
@@ -6425,7 +6904,10 @@ def doDescribeSecurityJSInjectionRule(args, parsed_globals):
|
|
|
6425
6904
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6426
6905
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6427
6906
|
)
|
|
6428
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6907
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6908
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6909
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6910
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6429
6911
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6430
6912
|
else:
|
|
6431
6913
|
cred = credential.Credential(
|
|
@@ -6477,7 +6959,10 @@ def doCreateRule(args, parsed_globals):
|
|
|
6477
6959
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6478
6960
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6479
6961
|
)
|
|
6480
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6962
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6963
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6964
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6965
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6481
6966
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6482
6967
|
else:
|
|
6483
6968
|
cred = credential.Credential(
|
|
@@ -6529,7 +7014,10 @@ def doCreateConfigGroupVersion(args, parsed_globals):
|
|
|
6529
7014
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6530
7015
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6531
7016
|
)
|
|
6532
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7017
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7018
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7019
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7020
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6533
7021
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6534
7022
|
else:
|
|
6535
7023
|
cred = credential.Credential(
|
|
@@ -6581,7 +7069,10 @@ def doModifyDnsRecordsStatus(args, parsed_globals):
|
|
|
6581
7069
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6582
7070
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6583
7071
|
)
|
|
6584
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7072
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7073
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7074
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7075
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6585
7076
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6586
7077
|
else:
|
|
6587
7078
|
cred = credential.Credential(
|
|
@@ -6633,7 +7124,10 @@ def doModifyFunction(args, parsed_globals):
|
|
|
6633
7124
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6634
7125
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6635
7126
|
)
|
|
6636
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7127
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7128
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7129
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7130
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6637
7131
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6638
7132
|
else:
|
|
6639
7133
|
cred = credential.Credential(
|
|
@@ -6685,7 +7179,10 @@ def doModifyApplicationProxy(args, parsed_globals):
|
|
|
6685
7179
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6686
7180
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6687
7181
|
)
|
|
6688
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7182
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7183
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7184
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7185
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6689
7186
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6690
7187
|
else:
|
|
6691
7188
|
cred = credential.Credential(
|
|
@@ -6737,7 +7234,10 @@ def doDescribeDnsData(args, parsed_globals):
|
|
|
6737
7234
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6738
7235
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6739
7236
|
)
|
|
6740
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7237
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7238
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7239
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7240
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6741
7241
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6742
7242
|
else:
|
|
6743
7243
|
cred = credential.Credential(
|
|
@@ -6789,7 +7289,10 @@ def doCreateZone(args, parsed_globals):
|
|
|
6789
7289
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6790
7290
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6791
7291
|
)
|
|
6792
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7292
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7293
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7294
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7295
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6793
7296
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6794
7297
|
else:
|
|
6795
7298
|
cred = credential.Credential(
|
|
@@ -6841,7 +7344,10 @@ def doDescribeWebSecurityTemplates(args, parsed_globals):
|
|
|
6841
7344
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6842
7345
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6843
7346
|
)
|
|
6844
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7347
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7348
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7349
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7350
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6845
7351
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6846
7352
|
else:
|
|
6847
7353
|
cred = credential.Credential(
|
|
@@ -6893,7 +7399,10 @@ def doDescribeAvailablePlans(args, parsed_globals):
|
|
|
6893
7399
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6894
7400
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6895
7401
|
)
|
|
6896
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7402
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7403
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7404
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7405
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6897
7406
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6898
7407
|
else:
|
|
6899
7408
|
cred = credential.Credential(
|
|
@@ -6945,7 +7454,10 @@ def doDescribeZoneDDoSPolicy(args, parsed_globals):
|
|
|
6945
7454
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6946
7455
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6947
7456
|
)
|
|
6948
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7457
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7458
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7459
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7460
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6949
7461
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6950
7462
|
else:
|
|
6951
7463
|
cred = credential.Credential(
|
|
@@ -6997,7 +7509,10 @@ def doDescribeCustomErrorPages(args, parsed_globals):
|
|
|
6997
7509
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6998
7510
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6999
7511
|
)
|
|
7000
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7512
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7513
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7514
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7515
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7001
7516
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7002
7517
|
else:
|
|
7003
7518
|
cred = credential.Credential(
|
|
@@ -7049,7 +7564,10 @@ def doDescribePlans(args, parsed_globals):
|
|
|
7049
7564
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7050
7565
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7051
7566
|
)
|
|
7052
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7567
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7568
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7569
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7570
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7053
7571
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7054
7572
|
else:
|
|
7055
7573
|
cred = credential.Credential(
|
|
@@ -7101,7 +7619,10 @@ def doCreateSecurityClientAttester(args, parsed_globals):
|
|
|
7101
7619
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7102
7620
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7103
7621
|
)
|
|
7104
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7622
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7623
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7624
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7625
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7105
7626
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7106
7627
|
else:
|
|
7107
7628
|
cred = credential.Credential(
|
|
@@ -7153,7 +7674,10 @@ def doDisableOriginACL(args, parsed_globals):
|
|
|
7153
7674
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7154
7675
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7155
7676
|
)
|
|
7156
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7677
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7678
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7679
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7680
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7157
7681
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7158
7682
|
else:
|
|
7159
7683
|
cred = credential.Credential(
|
|
@@ -7205,7 +7729,10 @@ def doModifyPlan(args, parsed_globals):
|
|
|
7205
7729
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7206
7730
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7207
7731
|
)
|
|
7208
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7732
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7733
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7734
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7735
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7209
7736
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7210
7737
|
else:
|
|
7211
7738
|
cred = credential.Credential(
|
|
@@ -7257,7 +7784,10 @@ def doDeleteContentIdentifier(args, parsed_globals):
|
|
|
7257
7784
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7258
7785
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7259
7786
|
)
|
|
7260
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7787
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7788
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7789
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7790
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7261
7791
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7262
7792
|
else:
|
|
7263
7793
|
cred = credential.Credential(
|
|
@@ -7309,7 +7839,10 @@ def doDescribeRulesSetting(args, parsed_globals):
|
|
|
7309
7839
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7310
7840
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7311
7841
|
)
|
|
7312
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7842
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7843
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7844
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7845
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7313
7846
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7314
7847
|
else:
|
|
7315
7848
|
cred = credential.Credential(
|
|
@@ -7361,7 +7894,10 @@ def doDescribeHostsCertificate(args, parsed_globals):
|
|
|
7361
7894
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7362
7895
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7363
7896
|
)
|
|
7364
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7897
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7898
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7899
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7900
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7365
7901
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7366
7902
|
else:
|
|
7367
7903
|
cred = credential.Credential(
|
|
@@ -7413,7 +7949,10 @@ def doModifyLoadBalancing(args, parsed_globals):
|
|
|
7413
7949
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7414
7950
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7415
7951
|
)
|
|
7416
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7952
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7953
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7954
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7955
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7417
7956
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7418
7957
|
else:
|
|
7419
7958
|
cred = credential.Credential(
|
|
@@ -7465,7 +8004,10 @@ def doModifyAccelerationDomainStatuses(args, parsed_globals):
|
|
|
7465
8004
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7466
8005
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7467
8006
|
)
|
|
7468
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8007
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8008
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8009
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8010
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7469
8011
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7470
8012
|
else:
|
|
7471
8013
|
cred = credential.Credential(
|
|
@@ -7517,7 +8059,10 @@ def doModifySecurityAPIService(args, parsed_globals):
|
|
|
7517
8059
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7518
8060
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7519
8061
|
)
|
|
7520
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8062
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8063
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8064
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8065
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7521
8066
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7522
8067
|
else:
|
|
7523
8068
|
cred = credential.Credential(
|
|
@@ -7569,7 +8114,10 @@ def doDescribeApplicationProxyDetail(args, parsed_globals):
|
|
|
7569
8114
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7570
8115
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7571
8116
|
)
|
|
7572
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8117
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8118
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8119
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8120
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7573
8121
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7574
8122
|
else:
|
|
7575
8123
|
cred = credential.Credential(
|
|
@@ -7621,7 +8169,10 @@ def doDescribeFunctionRules(args, parsed_globals):
|
|
|
7621
8169
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7622
8170
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7623
8171
|
)
|
|
7624
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8172
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8173
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8174
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8175
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7625
8176
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7626
8177
|
else:
|
|
7627
8178
|
cred = credential.Credential(
|
|
@@ -7673,7 +8224,10 @@ def doUpgradePlan(args, parsed_globals):
|
|
|
7673
8224
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7674
8225
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7675
8226
|
)
|
|
7676
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8227
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8228
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8229
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8230
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7677
8231
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7678
8232
|
else:
|
|
7679
8233
|
cred = credential.Credential(
|
|
@@ -7725,7 +8279,10 @@ def doDescribeDDoSAttackTopData(args, parsed_globals):
|
|
|
7725
8279
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7726
8280
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7727
8281
|
)
|
|
7728
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8282
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8283
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8284
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8285
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7729
8286
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7730
8287
|
else:
|
|
7731
8288
|
cred = credential.Credential(
|
|
@@ -7777,7 +8334,10 @@ def doDescribeWebProtectionLog(args, parsed_globals):
|
|
|
7777
8334
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7778
8335
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7779
8336
|
)
|
|
7780
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8337
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8338
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8339
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8340
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7781
8341
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7782
8342
|
else:
|
|
7783
8343
|
cred = credential.Credential(
|
|
@@ -7829,7 +8389,10 @@ def doModifyZoneStatus(args, parsed_globals):
|
|
|
7829
8389
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7830
8390
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7831
8391
|
)
|
|
7832
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8392
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8393
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8394
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8395
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7833
8396
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7834
8397
|
else:
|
|
7835
8398
|
cred = credential.Credential(
|
|
@@ -7881,7 +8444,10 @@ def doCreateL7AccRules(args, parsed_globals):
|
|
|
7881
8444
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7882
8445
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7883
8446
|
)
|
|
7884
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8447
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8448
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8449
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8450
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7885
8451
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7886
8452
|
else:
|
|
7887
8453
|
cred = credential.Credential(
|
|
@@ -7933,7 +8499,10 @@ def doDescribePurgeTasks(args, parsed_globals):
|
|
|
7933
8499
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7934
8500
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7935
8501
|
)
|
|
7936
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8502
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8503
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8504
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8505
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7937
8506
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7938
8507
|
else:
|
|
7939
8508
|
cred = credential.Credential(
|
|
@@ -7985,7 +8554,10 @@ def doDescribeMultiPathGateway(args, parsed_globals):
|
|
|
7985
8554
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7986
8555
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7987
8556
|
)
|
|
7988
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8557
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8558
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8559
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8560
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7989
8561
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7990
8562
|
else:
|
|
7991
8563
|
cred = credential.Credential(
|
|
@@ -8037,7 +8609,10 @@ def doDeleteRules(args, parsed_globals):
|
|
|
8037
8609
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8038
8610
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8039
8611
|
)
|
|
8040
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8612
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8613
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8614
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8615
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8041
8616
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8042
8617
|
else:
|
|
8043
8618
|
cred = credential.Credential(
|
|
@@ -8089,7 +8664,10 @@ def doDeleteSecurityAPIService(args, parsed_globals):
|
|
|
8089
8664
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8090
8665
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8091
8666
|
)
|
|
8092
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8667
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8668
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8669
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8670
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8093
8671
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8094
8672
|
else:
|
|
8095
8673
|
cred = credential.Credential(
|
|
@@ -8141,7 +8719,10 @@ def doDeleteMultiPathGateway(args, parsed_globals):
|
|
|
8141
8719
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8142
8720
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8143
8721
|
)
|
|
8144
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8722
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8723
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8724
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8725
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8145
8726
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8146
8727
|
else:
|
|
8147
8728
|
cred = credential.Credential(
|
|
@@ -8193,7 +8774,10 @@ def doDeleteLoadBalancing(args, parsed_globals):
|
|
|
8193
8774
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8194
8775
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8195
8776
|
)
|
|
8196
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8777
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8778
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8779
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8780
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8197
8781
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8198
8782
|
else:
|
|
8199
8783
|
cred = credential.Credential(
|
|
@@ -8245,7 +8829,10 @@ def doDeleteCustomErrorPage(args, parsed_globals):
|
|
|
8245
8829
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8246
8830
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8247
8831
|
)
|
|
8248
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8832
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8833
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8834
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8835
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8249
8836
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8250
8837
|
else:
|
|
8251
8838
|
cred = credential.Credential(
|
|
@@ -8297,7 +8884,10 @@ def doModifyZone(args, parsed_globals):
|
|
|
8297
8884
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8298
8885
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8299
8886
|
)
|
|
8300
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8887
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8888
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8889
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8890
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8301
8891
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8302
8892
|
else:
|
|
8303
8893
|
cred = credential.Credential(
|
|
@@ -8349,7 +8939,10 @@ def doHandleFunctionRuntimeEnvironment(args, parsed_globals):
|
|
|
8349
8939
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8350
8940
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8351
8941
|
)
|
|
8352
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8942
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8943
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8944
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8945
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8353
8946
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8354
8947
|
else:
|
|
8355
8948
|
cred = credential.Credential(
|
|
@@ -8401,7 +8994,10 @@ def doDescribeSecurityPortraitRules(args, parsed_globals):
|
|
|
8401
8994
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8402
8995
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8403
8996
|
)
|
|
8404
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8997
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8998
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8999
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9000
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8405
9001
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8406
9002
|
else:
|
|
8407
9003
|
cred = credential.Credential(
|
|
@@ -8453,7 +9049,10 @@ def doModifyContentIdentifier(args, parsed_globals):
|
|
|
8453
9049
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8454
9050
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8455
9051
|
)
|
|
8456
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9052
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9053
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9054
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9055
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8457
9056
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8458
9057
|
else:
|
|
8459
9058
|
cred = credential.Credential(
|
|
@@ -8505,7 +9104,10 @@ def doModifyDefaultCertificate(args, parsed_globals):
|
|
|
8505
9104
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8506
9105
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8507
9106
|
)
|
|
8508
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9107
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9108
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9109
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9110
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8509
9111
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8510
9112
|
else:
|
|
8511
9113
|
cred = credential.Credential(
|
|
@@ -8557,7 +9159,10 @@ def doDeleteWebSecurityTemplate(args, parsed_globals):
|
|
|
8557
9159
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8558
9160
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8559
9161
|
)
|
|
8560
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9162
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9163
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9164
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9165
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8561
9166
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8562
9167
|
else:
|
|
8563
9168
|
cred = credential.Credential(
|
|
@@ -8609,7 +9214,10 @@ def doModifySecurityClientAttester(args, parsed_globals):
|
|
|
8609
9214
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8610
9215
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8611
9216
|
)
|
|
8612
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9217
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9218
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9219
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9220
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8613
9221
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8614
9222
|
else:
|
|
8615
9223
|
cred = credential.Credential(
|
|
@@ -8661,7 +9269,10 @@ def doDescribeLoadBalancingDetail(args, parsed_globals):
|
|
|
8661
9269
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8662
9270
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8663
9271
|
)
|
|
8664
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9272
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9273
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9274
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9275
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8665
9276
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8666
9277
|
else:
|
|
8667
9278
|
cred = credential.Credential(
|
|
@@ -8713,7 +9324,10 @@ def doDescribeSecurityPolicy(args, parsed_globals):
|
|
|
8713
9324
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8714
9325
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8715
9326
|
)
|
|
8716
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9327
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9328
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9329
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9330
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8717
9331
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8718
9332
|
else:
|
|
8719
9333
|
cred = credential.Credential(
|
|
@@ -8765,7 +9379,10 @@ def doDeleteSecurityClientAttester(args, parsed_globals):
|
|
|
8765
9379
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8766
9380
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8767
9381
|
)
|
|
8768
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9382
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9383
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9384
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9385
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8769
9386
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8770
9387
|
else:
|
|
8771
9388
|
cred = credential.Credential(
|
|
@@ -8817,7 +9434,10 @@ def doModifyHostsCertificate(args, parsed_globals):
|
|
|
8817
9434
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8818
9435
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8819
9436
|
)
|
|
8820
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9437
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9438
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9439
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9440
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8821
9441
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8822
9442
|
else:
|
|
8823
9443
|
cred = credential.Credential(
|
|
@@ -8869,7 +9489,10 @@ def doModifyFunctionRulePriority(args, parsed_globals):
|
|
|
8869
9489
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8870
9490
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8871
9491
|
)
|
|
8872
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9492
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9493
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9494
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9495
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8873
9496
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8874
9497
|
else:
|
|
8875
9498
|
cred = credential.Credential(
|
|
@@ -8921,7 +9544,10 @@ def doModifySecurityIPGroup(args, parsed_globals):
|
|
|
8921
9544
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8922
9545
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8923
9546
|
)
|
|
8924
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9547
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9548
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9549
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9550
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8925
9551
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8926
9552
|
else:
|
|
8927
9553
|
cred = credential.Credential(
|
|
@@ -8973,7 +9599,10 @@ def doModifyMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
8973
9599
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8974
9600
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8975
9601
|
)
|
|
8976
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9602
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9603
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9604
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9605
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8977
9606
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8978
9607
|
else:
|
|
8979
9608
|
cred = credential.Credential(
|
|
@@ -9025,7 +9654,10 @@ def doDescribeRules(args, parsed_globals):
|
|
|
9025
9654
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9026
9655
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9027
9656
|
)
|
|
9028
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9657
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9658
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9659
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9660
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9029
9661
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9030
9662
|
else:
|
|
9031
9663
|
cred = credential.Credential(
|
|
@@ -9077,7 +9709,10 @@ def doCreateCLSIndex(args, parsed_globals):
|
|
|
9077
9709
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9078
9710
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9079
9711
|
)
|
|
9080
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9712
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9713
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9714
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9715
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9081
9716
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9082
9717
|
else:
|
|
9083
9718
|
cred = credential.Credential(
|
|
@@ -9129,7 +9764,10 @@ def doModifyLoadBalancer(args, parsed_globals):
|
|
|
9129
9764
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9130
9765
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9131
9766
|
)
|
|
9132
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9767
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9768
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9769
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9770
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9133
9771
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9134
9772
|
else:
|
|
9135
9773
|
cred = credential.Credential(
|
|
@@ -9181,7 +9819,10 @@ def doCreateApplicationProxy(args, parsed_globals):
|
|
|
9181
9819
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9182
9820
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9183
9821
|
)
|
|
9184
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9822
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9823
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9824
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9825
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9185
9826
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9186
9827
|
else:
|
|
9187
9828
|
cred = credential.Credential(
|
|
@@ -9233,7 +9874,10 @@ def doDeleteRealtimeLogDeliveryTask(args, parsed_globals):
|
|
|
9233
9874
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9234
9875
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9235
9876
|
)
|
|
9236
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9877
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9878
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9879
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9880
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9237
9881
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9238
9882
|
else:
|
|
9239
9883
|
cred = credential.Credential(
|
|
@@ -9285,7 +9929,10 @@ def doEnableOriginACL(args, parsed_globals):
|
|
|
9285
9929
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9286
9930
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9287
9931
|
)
|
|
9288
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9932
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9933
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9934
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9935
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9289
9936
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9290
9937
|
else:
|
|
9291
9938
|
cred = credential.Credential(
|
|
@@ -9337,7 +9984,10 @@ def doModifyAliasDomain(args, parsed_globals):
|
|
|
9337
9984
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9338
9985
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9339
9986
|
)
|
|
9340
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9987
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9988
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9989
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9990
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9341
9991
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9342
9992
|
else:
|
|
9343
9993
|
cred = credential.Credential(
|
|
@@ -9389,7 +10039,10 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
9389
10039
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9390
10040
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9391
10041
|
)
|
|
9392
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10042
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10043
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10044
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10045
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9393
10046
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9394
10047
|
else:
|
|
9395
10048
|
cred = credential.Credential(
|
|
@@ -9431,6 +10084,61 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
9431
10084
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
9432
10085
|
|
|
9433
10086
|
|
|
10087
|
+
def doDescribeMultiPathGatewayOriginACL(args, parsed_globals):
|
|
10088
|
+
g_param = parse_global_arg(parsed_globals)
|
|
10089
|
+
|
|
10090
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
10091
|
+
cred = credential.CVMRoleCredential()
|
|
10092
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
10093
|
+
cred = credential.STSAssumeRoleCredential(
|
|
10094
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10095
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10096
|
+
)
|
|
10097
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10098
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10099
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10100
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10101
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10102
|
+
else:
|
|
10103
|
+
cred = credential.Credential(
|
|
10104
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
10105
|
+
)
|
|
10106
|
+
http_profile = HttpProfile(
|
|
10107
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
10108
|
+
reqMethod="POST",
|
|
10109
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
10110
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
10111
|
+
)
|
|
10112
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
10113
|
+
if g_param[OptionsDefine.Language]:
|
|
10114
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
10115
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
10116
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
10117
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
10118
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
10119
|
+
model = models.DescribeMultiPathGatewayOriginACLRequest()
|
|
10120
|
+
model.from_json_string(json.dumps(args))
|
|
10121
|
+
start_time = time.time()
|
|
10122
|
+
while True:
|
|
10123
|
+
rsp = client.DescribeMultiPathGatewayOriginACL(model)
|
|
10124
|
+
result = rsp.to_json_string()
|
|
10125
|
+
try:
|
|
10126
|
+
json_obj = json.loads(result)
|
|
10127
|
+
except TypeError as e:
|
|
10128
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
10129
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
10130
|
+
break
|
|
10131
|
+
cur_time = time.time()
|
|
10132
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
10133
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
10134
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
10135
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
10136
|
+
else:
|
|
10137
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
10138
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
10139
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
10140
|
+
|
|
10141
|
+
|
|
9434
10142
|
def doDescribeJustInTimeTranscodeTemplates(args, parsed_globals):
|
|
9435
10143
|
g_param = parse_global_arg(parsed_globals)
|
|
9436
10144
|
|
|
@@ -9441,7 +10149,10 @@ def doDescribeJustInTimeTranscodeTemplates(args, parsed_globals):
|
|
|
9441
10149
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9442
10150
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9443
10151
|
)
|
|
9444
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10152
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10153
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10154
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10155
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9445
10156
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9446
10157
|
else:
|
|
9447
10158
|
cred = credential.Credential(
|
|
@@ -9493,7 +10204,10 @@ def doModifyApplicationProxyRule(args, parsed_globals):
|
|
|
9493
10204
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9494
10205
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9495
10206
|
)
|
|
9496
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10207
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10208
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10209
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10210
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9497
10211
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9498
10212
|
else:
|
|
9499
10213
|
cred = credential.Credential(
|
|
@@ -9545,7 +10259,10 @@ def doDescribeL7AccSetting(args, parsed_globals):
|
|
|
9545
10259
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9546
10260
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9547
10261
|
)
|
|
9548
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10262
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10263
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10264
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10265
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9549
10266
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9550
10267
|
else:
|
|
9551
10268
|
cred = credential.Credential(
|
|
@@ -9597,7 +10314,10 @@ def doCreateOriginGroup(args, parsed_globals):
|
|
|
9597
10314
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9598
10315
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9599
10316
|
)
|
|
9600
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10317
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10318
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10319
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10320
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9601
10321
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9602
10322
|
else:
|
|
9603
10323
|
cred = credential.Credential(
|
|
@@ -9649,7 +10369,10 @@ def doCreateCustomErrorPage(args, parsed_globals):
|
|
|
9649
10369
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9650
10370
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9651
10371
|
)
|
|
9652
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10372
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10373
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10374
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10375
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9653
10376
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9654
10377
|
else:
|
|
9655
10378
|
cred = credential.Credential(
|
|
@@ -9701,7 +10424,10 @@ def doCreateJustInTimeTranscodeTemplate(args, parsed_globals):
|
|
|
9701
10424
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9702
10425
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9703
10426
|
)
|
|
9704
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10427
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10428
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10429
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10430
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9705
10431
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9706
10432
|
else:
|
|
9707
10433
|
cred = credential.Credential(
|
|
@@ -9753,7 +10479,10 @@ def doDescribeDeployHistory(args, parsed_globals):
|
|
|
9753
10479
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9754
10480
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9755
10481
|
)
|
|
9756
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10482
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10483
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10484
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10485
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9757
10486
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9758
10487
|
else:
|
|
9759
10488
|
cred = credential.Credential(
|
|
@@ -9805,7 +10534,10 @@ def doDeployConfigGroupVersion(args, parsed_globals):
|
|
|
9805
10534
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9806
10535
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9807
10536
|
)
|
|
9808
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10537
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10538
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10539
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10540
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9809
10541
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9810
10542
|
else:
|
|
9811
10543
|
cred = credential.Credential(
|
|
@@ -9857,7 +10589,10 @@ def doModifyZoneCnameSpeedUp(args, parsed_globals):
|
|
|
9857
10589
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9858
10590
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9859
10591
|
)
|
|
9860
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10592
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10593
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10594
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10595
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9861
10596
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9862
10597
|
else:
|
|
9863
10598
|
cred = credential.Credential(
|
|
@@ -9909,7 +10644,10 @@ def doModifyDnsRecord(args, parsed_globals):
|
|
|
9909
10644
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9910
10645
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9911
10646
|
)
|
|
9912
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10647
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10648
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10649
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10650
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9913
10651
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9914
10652
|
else:
|
|
9915
10653
|
cred = credential.Credential(
|
|
@@ -9961,7 +10699,10 @@ def doDescribeDDosMajorAttackEvent(args, parsed_globals):
|
|
|
9961
10699
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9962
10700
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9963
10701
|
)
|
|
9964
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10702
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10703
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10704
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10705
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9965
10706
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9966
10707
|
else:
|
|
9967
10708
|
cred = credential.Credential(
|
|
@@ -10013,7 +10754,10 @@ def doDescribeWebManagedRulesLog(args, parsed_globals):
|
|
|
10013
10754
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10014
10755
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10015
10756
|
)
|
|
10016
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10757
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10758
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10759
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10760
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10017
10761
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10018
10762
|
else:
|
|
10019
10763
|
cred = credential.Credential(
|
|
@@ -10065,7 +10809,10 @@ def doDescribeHostsSetting(args, parsed_globals):
|
|
|
10065
10809
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10066
10810
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10067
10811
|
)
|
|
10068
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10812
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10813
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10814
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10815
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10069
10816
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10070
10817
|
else:
|
|
10071
10818
|
cred = credential.Credential(
|
|
@@ -10117,7 +10864,10 @@ def doDescribeSecurityTemplateBindings(args, parsed_globals):
|
|
|
10117
10864
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10118
10865
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10119
10866
|
)
|
|
10120
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10867
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10868
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10869
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10870
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10121
10871
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10122
10872
|
else:
|
|
10123
10873
|
cred = credential.Credential(
|
|
@@ -10169,7 +10919,10 @@ def doDeleteL4Proxy(args, parsed_globals):
|
|
|
10169
10919
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10170
10920
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10171
10921
|
)
|
|
10172
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10922
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10923
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10924
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10925
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10173
10926
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10174
10927
|
else:
|
|
10175
10928
|
cred = credential.Credential(
|
|
@@ -10221,7 +10974,10 @@ def doBindSharedCNAME(args, parsed_globals):
|
|
|
10221
10974
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10222
10975
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10223
10976
|
)
|
|
10224
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
10977
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
10978
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
10979
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
10980
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10225
10981
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10226
10982
|
else:
|
|
10227
10983
|
cred = credential.Credential(
|
|
@@ -10273,7 +11029,10 @@ def doModifyRealtimeLogDeliveryTask(args, parsed_globals):
|
|
|
10273
11029
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10274
11030
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10275
11031
|
)
|
|
10276
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11032
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11033
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11034
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11035
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10277
11036
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10278
11037
|
else:
|
|
10279
11038
|
cred = credential.Credential(
|
|
@@ -10325,7 +11084,10 @@ def doDescribeOriginProtection(args, parsed_globals):
|
|
|
10325
11084
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10326
11085
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10327
11086
|
)
|
|
10328
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11087
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11088
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11089
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11090
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10329
11091
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10330
11092
|
else:
|
|
10331
11093
|
cred = credential.Credential(
|
|
@@ -10377,7 +11139,10 @@ def doModifyL4ProxyRulesStatus(args, parsed_globals):
|
|
|
10377
11139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10378
11140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10379
11141
|
)
|
|
10380
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10381
11146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10382
11147
|
else:
|
|
10383
11148
|
cred = credential.Credential(
|
|
@@ -10429,7 +11194,10 @@ def doRenewPlan(args, parsed_globals):
|
|
|
10429
11194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10430
11195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10431
11196
|
)
|
|
10432
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10433
11201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10434
11202
|
else:
|
|
10435
11203
|
cred = credential.Credential(
|
|
@@ -10481,7 +11249,10 @@ def doDescribeZoneSetting(args, parsed_globals):
|
|
|
10481
11249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10482
11250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10483
11251
|
)
|
|
10484
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10485
11256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10486
11257
|
else:
|
|
10487
11258
|
cred = credential.Credential(
|
|
@@ -10533,7 +11304,10 @@ def doDescribeSecurityAPIResource(args, parsed_globals):
|
|
|
10533
11304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10534
11305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10535
11306
|
)
|
|
10536
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10537
11311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10538
11312
|
else:
|
|
10539
11313
|
cred = credential.Credential(
|
|
@@ -10585,7 +11359,10 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
|
|
|
10585
11359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10586
11360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10587
11361
|
)
|
|
10588
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10589
11366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10590
11367
|
else:
|
|
10591
11368
|
cred = credential.Credential(
|
|
@@ -10637,7 +11414,10 @@ def doCreateContentIdentifier(args, parsed_globals):
|
|
|
10637
11414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10638
11415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10639
11416
|
)
|
|
10640
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10641
11421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10642
11422
|
else:
|
|
10643
11423
|
cred = credential.Credential(
|
|
@@ -10689,7 +11469,10 @@ def doDeleteSecurityIPGroup(args, parsed_globals):
|
|
|
10689
11469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10690
11470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10691
11471
|
)
|
|
10692
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10693
11476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10694
11477
|
else:
|
|
10695
11478
|
cred = credential.Credential(
|
|
@@ -10741,7 +11524,10 @@ def doCreateApplicationProxyRule(args, parsed_globals):
|
|
|
10741
11524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10742
11525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10743
11526
|
)
|
|
10744
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10745
11531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10746
11532
|
else:
|
|
10747
11533
|
cred = credential.Credential(
|
|
@@ -10793,7 +11579,10 @@ def doModifySecurityJSInjectionRule(args, parsed_globals):
|
|
|
10793
11579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10794
11580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10795
11581
|
)
|
|
10796
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10797
11586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10798
11587
|
else:
|
|
10799
11588
|
cred = credential.Credential(
|
|
@@ -10845,7 +11634,10 @@ def doDescribeMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
10845
11634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10846
11635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10847
11636
|
)
|
|
10848
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10849
11641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10850
11642
|
else:
|
|
10851
11643
|
cred = credential.Credential(
|
|
@@ -10897,7 +11689,10 @@ def doDescribeFunctions(args, parsed_globals):
|
|
|
10897
11689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10898
11690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10899
11691
|
)
|
|
10900
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10901
11696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10902
11697
|
else:
|
|
10903
11698
|
cred = credential.Credential(
|
|
@@ -10949,7 +11744,10 @@ def doReclaimZone(args, parsed_globals):
|
|
|
10949
11744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
10950
11745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
10951
11746
|
)
|
|
10952
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
10953
11751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
10954
11752
|
else:
|
|
10955
11753
|
cred = credential.Credential(
|
|
@@ -11001,7 +11799,10 @@ def doDeleteZone(args, parsed_globals):
|
|
|
11001
11799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11002
11800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11003
11801
|
)
|
|
11004
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11005
11806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11006
11807
|
else:
|
|
11007
11808
|
cred = credential.Credential(
|
|
@@ -11053,7 +11854,10 @@ def doDescribeDDosAttackEvent(args, parsed_globals):
|
|
|
11053
11854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11054
11855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11055
11856
|
)
|
|
11056
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11057
11861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11058
11862
|
else:
|
|
11059
11863
|
cred = credential.Credential(
|
|
@@ -11105,7 +11909,10 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
|
11105
11909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11106
11910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11107
11911
|
)
|
|
11108
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11109
11916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11110
11917
|
else:
|
|
11111
11918
|
cred = credential.Credential(
|
|
@@ -11157,7 +11964,10 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
|
11157
11964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11158
11965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11159
11966
|
)
|
|
11160
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
11967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11161
11971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11162
11972
|
else:
|
|
11163
11973
|
cred = credential.Credential(
|
|
@@ -11209,7 +12019,10 @@ def doCreatePlan(args, parsed_globals):
|
|
|
11209
12019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11210
12020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11211
12021
|
)
|
|
11212
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11213
12026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11214
12027
|
else:
|
|
11215
12028
|
cred = credential.Credential(
|
|
@@ -11261,7 +12074,10 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
|
11261
12074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11262
12075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11263
12076
|
)
|
|
11264
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11265
12081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11266
12082
|
else:
|
|
11267
12083
|
cred = credential.Credential(
|
|
@@ -11313,7 +12129,10 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
|
11313
12129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11314
12130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11315
12131
|
)
|
|
11316
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11317
12136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11318
12137
|
else:
|
|
11319
12138
|
cred = credential.Credential(
|
|
@@ -11365,7 +12184,10 @@ def doDescribeSecurityAPIService(args, parsed_globals):
|
|
|
11365
12184
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11366
12185
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11367
12186
|
)
|
|
11368
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11369
12191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11370
12192
|
else:
|
|
11371
12193
|
cred = credential.Credential(
|
|
@@ -11417,7 +12239,10 @@ def doImportZoneConfig(args, parsed_globals):
|
|
|
11417
12239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11418
12240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11419
12241
|
)
|
|
11420
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11421
12246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11422
12247
|
else:
|
|
11423
12248
|
cred = credential.Credential(
|
|
@@ -11469,7 +12294,10 @@ def doDescribeDDosAttackData(args, parsed_globals):
|
|
|
11469
12294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11470
12295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11471
12296
|
)
|
|
11472
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11473
12301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11474
12302
|
else:
|
|
11475
12303
|
cred = credential.Credential(
|
|
@@ -11521,7 +12349,10 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
11521
12349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11522
12350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11523
12351
|
)
|
|
11524
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11525
12356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11526
12357
|
else:
|
|
11527
12358
|
cred = credential.Credential(
|
|
@@ -11573,7 +12404,10 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
|
11573
12404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11574
12405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11575
12406
|
)
|
|
11576
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11577
12411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11578
12412
|
else:
|
|
11579
12413
|
cred = credential.Credential(
|
|
@@ -11625,7 +12459,10 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
|
11625
12459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11626
12460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11627
12461
|
)
|
|
11628
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11629
12466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11630
12467
|
else:
|
|
11631
12468
|
cred = credential.Credential(
|
|
@@ -11677,7 +12514,10 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
|
11677
12514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11678
12515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11679
12516
|
)
|
|
11680
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11681
12521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11682
12522
|
else:
|
|
11683
12523
|
cred = credential.Credential(
|
|
@@ -11729,7 +12569,10 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
|
11729
12569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11730
12570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11731
12571
|
)
|
|
11732
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11733
12576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11734
12577
|
else:
|
|
11735
12578
|
cred = credential.Credential(
|
|
@@ -11781,7 +12624,10 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
|
11781
12624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11782
12625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11783
12626
|
)
|
|
11784
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11785
12631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11786
12632
|
else:
|
|
11787
12633
|
cred = credential.Credential(
|
|
@@ -11833,7 +12679,10 @@ def doImportDnsRecords(args, parsed_globals):
|
|
|
11833
12679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11834
12680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11835
12681
|
)
|
|
11836
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11837
12686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11838
12687
|
else:
|
|
11839
12688
|
cred = credential.Credential(
|
|
@@ -11885,7 +12734,10 @@ def doCreateSecurityAPIService(args, parsed_globals):
|
|
|
11885
12734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11886
12735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11887
12736
|
)
|
|
11888
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11889
12741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11890
12742
|
else:
|
|
11891
12743
|
cred = credential.Credential(
|
|
@@ -11937,7 +12789,10 @@ def doDescribeSecurityPolicyManagedRulesId(args, parsed_globals):
|
|
|
11937
12789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11938
12790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11939
12791
|
)
|
|
11940
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11941
12796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11942
12797
|
else:
|
|
11943
12798
|
cred = credential.Credential(
|
|
@@ -11989,7 +12844,10 @@ def doDescribeAliasDomains(args, parsed_globals):
|
|
|
11989
12844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11990
12845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11991
12846
|
)
|
|
11992
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11993
12851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11994
12852
|
else:
|
|
11995
12853
|
cred = credential.Credential(
|
|
@@ -12041,7 +12899,10 @@ def doDescribeOriginGroupDetail(args, parsed_globals):
|
|
|
12041
12899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
12042
12900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
12043
12901
|
)
|
|
12044
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
12045
12906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
12046
12907
|
else:
|
|
12047
12908
|
cred = credential.Credential(
|
|
@@ -12093,7 +12954,10 @@ def doDescribeL4Proxy(args, parsed_globals):
|
|
|
12093
12954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
12094
12955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
12095
12956
|
)
|
|
12096
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
12957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
12958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
12959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
12960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
12097
12961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
12098
12962
|
else:
|
|
12099
12963
|
cred = credential.Credential(
|
|
@@ -12145,7 +13009,10 @@ def doDeleteMultiPathGatewayLine(args, parsed_globals):
|
|
|
12145
13009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
12146
13010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
12147
13011
|
)
|
|
12148
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
13012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
13013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
13014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
13015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
12149
13016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
12150
13017
|
else:
|
|
12151
13018
|
cred = credential.Credential(
|
|
@@ -12197,7 +13064,10 @@ def doDescribeBillingData(args, parsed_globals):
|
|
|
12197
13064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
12198
13065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
12199
13066
|
)
|
|
12200
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
13067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
13068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
13069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
13070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
12201
13071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
12202
13072
|
else:
|
|
12203
13073
|
cred = credential.Credential(
|
|
@@ -12249,7 +13119,10 @@ def doDeleteJustInTimeTranscodeTemplates(args, parsed_globals):
|
|
|
12249
13119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
12250
13120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
12251
13121
|
)
|
|
12252
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
13122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
13123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
13124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
13125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
12253
13126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
12254
13127
|
else:
|
|
12255
13128
|
cred = credential.Credential(
|
|
@@ -12301,7 +13174,10 @@ def doModifyDnssec(args, parsed_globals):
|
|
|
12301
13174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
12302
13175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
12303
13176
|
)
|
|
12304
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
13177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
13178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
13179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
13180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
12305
13181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
12306
13182
|
else:
|
|
12307
13183
|
cred = credential.Credential(
|
|
@@ -12353,7 +13229,10 @@ def doDescribeOriginGroupHealthStatus(args, parsed_globals):
|
|
|
12353
13229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
12354
13230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
12355
13231
|
)
|
|
12356
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
13232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
13233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
13234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
13235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
12357
13236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
12358
13237
|
else:
|
|
12359
13238
|
cred = credential.Credential(
|
|
@@ -12429,6 +13308,7 @@ ACTION_MAP = {
|
|
|
12429
13308
|
"DeleteFunctionRules": doDeleteFunctionRules,
|
|
12430
13309
|
"CreateLoadBalancing": doCreateLoadBalancing,
|
|
12431
13310
|
"ModifyDDoSPolicyHost": doModifyDDoSPolicyHost,
|
|
13311
|
+
"ModifyMultiPathGatewayStatus": doModifyMultiPathGatewayStatus,
|
|
12432
13312
|
"IdentifyZone": doIdentifyZone,
|
|
12433
13313
|
"DescribeDefaultCertificates": doDescribeDefaultCertificates,
|
|
12434
13314
|
"ModifyL7AccRule": doModifyL7AccRule,
|
|
@@ -12499,8 +13379,8 @@ ACTION_MAP = {
|
|
|
12499
13379
|
"DescribeSecurityIPGroup": doDescribeSecurityIPGroup,
|
|
12500
13380
|
"CreateL4ProxyRules": doCreateL4ProxyRules,
|
|
12501
13381
|
"DescribeOriginGroup": doDescribeOriginGroup,
|
|
12502
|
-
"DescribeTopL7CacheData": doDescribeTopL7CacheData,
|
|
12503
13382
|
"DescribeTimingL4Data": doDescribeTimingL4Data,
|
|
13383
|
+
"DescribeTopL7CacheData": doDescribeTopL7CacheData,
|
|
12504
13384
|
"ScanDnsRecords": doScanDnsRecords,
|
|
12505
13385
|
"ModifyRule": doModifyRule,
|
|
12506
13386
|
"DescribeMultiPathGateways": doDescribeMultiPathGateways,
|
|
@@ -12531,6 +13411,7 @@ ACTION_MAP = {
|
|
|
12531
13411
|
"ModifyMultiPathGateway": doModifyMultiPathGateway,
|
|
12532
13412
|
"CreateSharedCNAME": doCreateSharedCNAME,
|
|
12533
13413
|
"DescribeDnssec": doDescribeDnssec,
|
|
13414
|
+
"ConfirmMultiPathGatewayOriginACL": doConfirmMultiPathGatewayOriginACL,
|
|
12534
13415
|
"DescribeSecurityJSInjectionRule": doDescribeSecurityJSInjectionRule,
|
|
12535
13416
|
"CreateRule": doCreateRule,
|
|
12536
13417
|
"CreateConfigGroupVersion": doCreateConfigGroupVersion,
|
|
@@ -12589,6 +13470,7 @@ ACTION_MAP = {
|
|
|
12589
13470
|
"EnableOriginACL": doEnableOriginACL,
|
|
12590
13471
|
"ModifyAliasDomain": doModifyAliasDomain,
|
|
12591
13472
|
"CreateLoadBalancer": doCreateLoadBalancer,
|
|
13473
|
+
"DescribeMultiPathGatewayOriginACL": doDescribeMultiPathGatewayOriginACL,
|
|
12592
13474
|
"DescribeJustInTimeTranscodeTemplates": doDescribeJustInTimeTranscodeTemplates,
|
|
12593
13475
|
"ModifyApplicationProxyRule": doModifyApplicationProxyRule,
|
|
12594
13476
|
"DescribeL7AccSetting": doDescribeL7AccSetting,
|