tccli-intl-en 3.0.1237.1__py2.py3-none-any.whl → 3.0.1282.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +17 -1
- tccli/services/advisor/advisor_client.py +8 -2
- tccli/services/aiart/aiart_client.py +4 -1
- tccli/services/ams/ams_client.py +16 -4
- tccli/services/antiddos/antiddos_client.py +280 -70
- tccli/services/apigateway/apigateway_client.py +372 -93
- tccli/services/apm/apm_client.py +52 -13
- tccli/services/asr/asr_client.py +8 -2
- tccli/services/autoscaling/autoscaling_client.py +232 -58
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/batch_client.py +112 -28
- tccli/services/bi/bi_client.py +1242 -4
- tccli/services/bi/v20220105/api.json +5340 -107
- tccli/services/bi/v20220105/examples.json +196 -1
- tccli/services/billing/billing_client.py +168 -42
- tccli/services/cam/cam_client.py +324 -81
- tccli/services/captcha/captcha_client.py +4 -1
- tccli/services/car/car_client.py +132 -33
- tccli/services/cbs/cbs_client.py +152 -38
- tccli/services/ccc/ccc_client.py +732 -98
- tccli/services/ccc/v20200210/api.json +1727 -196
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +532 -133
- tccli/services/cdc/cdc_client.py +80 -20
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +176 -44
- tccli/services/cdwdoris/cdwdoris_client.py +308 -77
- tccli/services/cdwpg/cdwpg_client.py +96 -24
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +64 -16
- tccli/services/cfs/cfs_client.py +156 -39
- tccli/services/cfw/cfw_client.py +264 -66
- tccli/services/chdfs/chdfs_client.py +116 -29
- tccli/services/ciam/ciam_client.py +64 -16
- tccli/services/ckafka/ckafka_client.py +575 -77
- tccli/services/ckafka/v20190819/api.json +2749 -1470
- tccli/services/ckafka/v20190819/examples.json +209 -155
- tccli/services/clb/clb_client.py +332 -83
- tccli/services/clb/v20180317/api.json +29 -14
- tccli/services/cloudaudit/cloudaudit_client.py +72 -18
- tccli/services/cls/cls_client.py +348 -87
- tccli/services/cmq/cmq_client.py +12 -801
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +24 -6
- tccli/services/controlcenter/controlcenter_client.py +4 -1
- tccli/services/csip/csip_client.py +136 -34
- tccli/services/ctsdb/ctsdb_client.py +8 -2
- tccli/services/cvm/cvm_client.py +627 -110
- tccli/services/cvm/v20170312/api.json +750 -340
- tccli/services/cvm/v20170312/examples.json +105 -59
- tccli/services/cwp/cwp_client.py +1860 -465
- tccli/services/cynosdb/cynosdb_client.py +1749 -439
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +4 -1
- tccli/services/dayu/dayu_client.py +412 -103
- tccli/services/dbbrain/dbbrain_client.py +168 -42
- tccli/services/dc/dc_client.py +72 -18
- tccli/services/dcdb/dcdb_client.py +248 -62
- tccli/services/dlc/dlc_client.py +756 -111
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +8 -2
- tccli/services/dnspod/dnspod_client.py +353 -74
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +96 -24
- tccli/services/dts/dts_client.py +332 -83
- tccli/services/eb/eb_client.py +104 -26
- tccli/services/ecdn/ecdn_client.py +60 -15
- tccli/services/ecm/ecm_client.py +496 -124
- tccli/services/eiam/eiam_client.py +160 -40
- tccli/services/emr/emr_client.py +2784 -115
- tccli/services/emr/v20190103/api.json +14647 -4756
- tccli/services/emr/v20190103/examples.json +408 -40
- tccli/services/es/es_client.py +84 -21
- tccli/services/facefusion/facefusion_client.py +12 -3
- tccli/services/faceid/faceid_client.py +76 -19
- tccli/services/faceid/v20180301/api.json +79 -14
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +352 -88
- tccli/services/gme/gme_client.py +40 -10
- tccli/services/gpm/gpm_client.py +72 -18
- tccli/services/gse/gse_client.py +88 -22
- tccli/services/gwlb/gwlb_client.py +72 -18
- tccli/services/iai/iai_client.py +116 -29
- tccli/services/iap/iap_client.py +24 -6
- tccli/services/ims/ims_client.py +4 -1
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +168 -42
- tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
- tccli/services/iotcloud/iotcloud_client.py +80 -20
- tccli/services/ip/ip_client.py +24 -6
- tccli/services/kms/kms_client.py +272 -68
- tccli/services/lcic/lcic_client.py +212 -53
- tccli/services/lighthouse/lighthouse_client.py +296 -74
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +480 -120
- tccli/services/lke/lke_client.py +360 -90
- tccli/services/lke/v20231130/api.json +182 -39
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +546 -0
- tccli/services/lkeap/v20240522/api.json +855 -0
- tccli/services/lkeap/v20240522/examples.json +72 -0
- tccli/services/mariadb/mariadb_client.py +200 -50
- tccli/services/mdc/mdc_client.py +72 -18
- tccli/services/mdl/mdl_client.py +132 -33
- tccli/services/mdl/v20200326/api.json +186 -12
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/mdp_client.py +680 -70
- tccli/services/mdp/v20200527/api.json +748 -23
- tccli/services/mdp/v20200527/examples.json +143 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +340 -29
- tccli/services/mongodb/v20190725/api.json +811 -226
- tccli/services/mongodb/v20190725/examples.json +54 -22
- tccli/services/monitor/monitor_client.py +864 -152
- tccli/services/monitor/v20180724/api.json +657 -8
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +592 -92
- tccli/services/mps/v20190612/api.json +2931 -399
- tccli/services/mps/v20190612/examples.json +64 -14
- tccli/services/msp/msp_client.py +28 -7
- tccli/services/ocr/ocr_client.py +212 -45
- tccli/services/ocr/v20181119/api.json +872 -112
- tccli/services/ocr/v20181119/examples.json +12 -4
- tccli/services/omics/omics_client.py +80 -20
- tccli/services/organization/organization_client.py +464 -116
- tccli/services/postgres/postgres_client.py +364 -91
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +124 -31
- tccli/services/pts/pts_client.py +192 -48
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +4 -1
- tccli/services/redis/redis_client.py +592 -106
- tccli/services/redis/v20180412/api.json +636 -240
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/region_client.py +12 -3
- tccli/services/rum/rum_client.py +240 -60
- tccli/services/scf/scf_client.py +168 -42
- tccli/services/ses/ses_client.py +116 -29
- tccli/services/sms/sms_client.py +72 -18
- tccli/services/sqlserver/sqlserver_client.py +3772 -387
- tccli/services/sqlserver/v20180328/api.json +9760 -3380
- tccli/services/sqlserver/v20180328/examples.json +478 -18
- tccli/services/ssl/ssl_client.py +152 -38
- tccli/services/ssm/ssm_client.py +96 -24
- tccli/services/sts/sts_client.py +20 -5
- tccli/services/tag/tag_client.py +120 -30
- tccli/services/tat/tat_client.py +76 -19
- tccli/services/tbaas/tbaas_client.py +16 -4
- tccli/services/tcaplusdb/tcaplusdb_client.py +208 -52
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +4 -1
- tccli/services/tcmpp/tcmpp_client.py +416 -104
- tccli/services/tcr/tcr_client.py +304 -76
- tccli/services/tcsas/tcsas_client.py +236 -59
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1320 -330
- tccli/services/tdid/tdid_client.py +192 -48
- tccli/services/tdmq/tdmq_client.py +376 -94
- tccli/services/tem/tem_client.py +224 -56
- tccli/services/teo/teo_client.py +1127 -245
- tccli/services/teo/v20220901/api.json +382 -58
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +204 -51
- tccli/services/tke/tke_client.py +552 -138
- tccli/services/tms/tms_client.py +4 -1
- tccli/services/tmt/tmt_client.py +4 -1
- tccli/services/trabbit/trabbit_client.py +116 -29
- tccli/services/trro/trro_client.py +76 -19
- tccli/services/trtc/trtc_client.py +420 -55
- tccli/services/trtc/v20190722/api.json +685 -23
- tccli/services/trtc/v20190722/examples.json +39 -7
- tccli/services/tts/tts_client.py +4 -1
- tccli/services/vclm/vclm_client.py +8 -2
- tccli/services/vm/vm_client.py +16 -4
- tccli/services/vod/v20180717/examples.json +1 -1
- tccli/services/vod/vod_client.py +716 -179
- tccli/services/vpc/v20170312/api.json +970 -75
- tccli/services/vpc/v20170312/examples.json +106 -10
- tccli/services/vpc/vpc_client.py +1876 -361
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1051 -147
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +5830 -1026
- tccli/services/yunjing/yunjing_client.py +284 -71
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/RECORD +214 -192
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/top_level.txt +0 -0
tccli/services/tke/tke_client.py
CHANGED
|
@@ -29,7 +29,10 @@ def doCreateECMInstances(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -81,7 +84,10 @@ def doDescribeClusterVirtualNode(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -133,7 +139,10 @@ def doCreateCluster(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -185,7 +194,10 @@ def doDescribeSupportedRuntime(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -237,7 +249,10 @@ def doCreateClusterVirtualNodePool(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -289,7 +304,10 @@ def doModifyClusterAsGroupOptionAttribute(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -341,7 +359,10 @@ def doDescribeHealthCheckPolicyBindings(args, parsed_globals):
|
|
|
341
359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
361
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
367
|
else:
|
|
347
368
|
cred = credential.Credential(
|
|
@@ -393,7 +414,10 @@ def doEnableVpcCniNetworkType(args, parsed_globals):
|
|
|
393
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
416
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
422
|
else:
|
|
399
423
|
cred = credential.Credential(
|
|
@@ -445,7 +469,10 @@ def doDeleteCluster(args, parsed_globals):
|
|
|
445
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
471
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
477
|
else:
|
|
451
478
|
cred = credential.Credential(
|
|
@@ -497,7 +524,10 @@ def doDescribeExternalNodeSupportConfig(args, parsed_globals):
|
|
|
497
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
526
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
532
|
else:
|
|
503
533
|
cred = credential.Credential(
|
|
@@ -549,7 +579,10 @@ def doDeleteEdgeClusterInstances(args, parsed_globals):
|
|
|
549
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
581
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
587
|
else:
|
|
555
588
|
cred = credential.Credential(
|
|
@@ -601,7 +634,10 @@ def doModifyPrometheusAlertRule(args, parsed_globals):
|
|
|
601
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
636
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
642
|
else:
|
|
607
643
|
cred = credential.Credential(
|
|
@@ -653,7 +689,10 @@ def doSetNodePoolNodeProtection(args, parsed_globals):
|
|
|
653
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
691
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
697
|
else:
|
|
659
698
|
cred = credential.Credential(
|
|
@@ -705,7 +744,10 @@ def doDescribeEdgeAvailableExtraArgs(args, parsed_globals):
|
|
|
705
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
746
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
752
|
else:
|
|
711
753
|
cred = credential.Credential(
|
|
@@ -757,7 +799,10 @@ def doDescribeClusterCommonNames(args, parsed_globals):
|
|
|
757
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
801
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
807
|
else:
|
|
763
808
|
cred = credential.Credential(
|
|
@@ -809,7 +854,10 @@ def doDescribeIPAMD(args, parsed_globals):
|
|
|
809
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
856
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
862
|
else:
|
|
815
863
|
cred = credential.Credential(
|
|
@@ -861,7 +909,10 @@ def doCreateClusterRouteTable(args, parsed_globals):
|
|
|
861
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
911
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
917
|
else:
|
|
867
918
|
cred = credential.Credential(
|
|
@@ -913,7 +964,10 @@ def doGetUpgradeInstanceProgress(args, parsed_globals):
|
|
|
913
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
966
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
972
|
else:
|
|
919
973
|
cred = credential.Credential(
|
|
@@ -965,7 +1019,10 @@ def doModifyHealthCheckPolicy(args, parsed_globals):
|
|
|
965
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1021
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1027
|
else:
|
|
971
1028
|
cred = credential.Credential(
|
|
@@ -1017,7 +1074,10 @@ def doDeleteClusterVirtualNode(args, parsed_globals):
|
|
|
1017
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1076
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1082
|
else:
|
|
1023
1083
|
cred = credential.Credential(
|
|
@@ -1069,7 +1129,10 @@ def doDeleteBackupStorageLocation(args, parsed_globals):
|
|
|
1069
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1131
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1137
|
else:
|
|
1075
1138
|
cred = credential.Credential(
|
|
@@ -1121,7 +1184,10 @@ def doDescribeAvailableTKEEdgeVersion(args, parsed_globals):
|
|
|
1121
1184
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1185
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1186
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1192
|
else:
|
|
1127
1193
|
cred = credential.Credential(
|
|
@@ -1173,7 +1239,10 @@ def doDescribeTKEEdgeClusters(args, parsed_globals):
|
|
|
1173
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1241
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1247
|
else:
|
|
1179
1248
|
cred = credential.Credential(
|
|
@@ -1225,7 +1294,10 @@ def doDescribePodChargeInfo(args, parsed_globals):
|
|
|
1225
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1296
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1302
|
else:
|
|
1231
1303
|
cred = credential.Credential(
|
|
@@ -1277,7 +1349,10 @@ def doDescribeVersions(args, parsed_globals):
|
|
|
1277
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1351
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1357
|
else:
|
|
1283
1358
|
cred = credential.Credential(
|
|
@@ -1329,7 +1404,10 @@ def doCreateBackupStorageLocation(args, parsed_globals):
|
|
|
1329
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1406
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1412
|
else:
|
|
1335
1413
|
cred = credential.Credential(
|
|
@@ -1381,7 +1459,10 @@ def doDescribeEdgeLogSwitches(args, parsed_globals):
|
|
|
1381
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1461
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1467
|
else:
|
|
1387
1468
|
cred = credential.Credential(
|
|
@@ -1433,7 +1514,10 @@ def doUpdateEdgeClusterVersion(args, parsed_globals):
|
|
|
1433
1514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1516
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1522
|
else:
|
|
1439
1523
|
cred = credential.Credential(
|
|
@@ -1485,7 +1569,10 @@ def doDescribeTKEEdgeExternalKubeconfig(args, parsed_globals):
|
|
|
1485
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1571
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1577
|
else:
|
|
1491
1578
|
cred = credential.Credential(
|
|
@@ -1537,7 +1624,10 @@ def doDescribeClusters(args, parsed_globals):
|
|
|
1537
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1626
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1632
|
else:
|
|
1543
1633
|
cred = credential.Credential(
|
|
@@ -1589,7 +1679,10 @@ def doCreateCLSLogConfig(args, parsed_globals):
|
|
|
1589
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1681
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1687
|
else:
|
|
1595
1688
|
cred = credential.Credential(
|
|
@@ -1641,7 +1734,10 @@ def doDescribeEdgeClusterExtraArgs(args, parsed_globals):
|
|
|
1641
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1736
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1742
|
else:
|
|
1647
1743
|
cred = credential.Credential(
|
|
@@ -1693,7 +1789,10 @@ def doModifyClusterVirtualNodePool(args, parsed_globals):
|
|
|
1693
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1791
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1797
|
else:
|
|
1699
1798
|
cred = credential.Credential(
|
|
@@ -1745,7 +1844,10 @@ def doDescribeClusterAsGroups(args, parsed_globals):
|
|
|
1745
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1846
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1852
|
else:
|
|
1751
1853
|
cred = credential.Credential(
|
|
@@ -1797,7 +1899,10 @@ def doCreateClusterNodePool(args, parsed_globals):
|
|
|
1797
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
1901
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
1907
|
else:
|
|
1803
1908
|
cred = credential.Credential(
|
|
@@ -1849,7 +1954,10 @@ def doDescribeTKEEdgeClusterStatus(args, parsed_globals):
|
|
|
1849
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
1956
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
1962
|
else:
|
|
1855
1963
|
cred = credential.Credential(
|
|
@@ -1901,7 +2009,10 @@ def doDescribeAvailableClusterVersion(args, parsed_globals):
|
|
|
1901
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2011
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2017
|
else:
|
|
1907
2018
|
cred = credential.Credential(
|
|
@@ -1953,7 +2064,10 @@ def doDeleteClusterRouteTable(args, parsed_globals):
|
|
|
1953
2064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1954
2065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1955
2066
|
)
|
|
1956
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1957
2071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1958
2072
|
else:
|
|
1959
2073
|
cred = credential.Credential(
|
|
@@ -2005,7 +2119,10 @@ def doUpdateAddon(args, parsed_globals):
|
|
|
2005
2119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2006
2120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2007
2121
|
)
|
|
2008
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2009
2126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2010
2127
|
else:
|
|
2011
2128
|
cred = credential.Credential(
|
|
@@ -2057,7 +2174,10 @@ def doDescribeClusterAuthenticationOptions(args, parsed_globals):
|
|
|
2057
2174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2058
2175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2059
2176
|
)
|
|
2060
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2061
2181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2062
2182
|
else:
|
|
2063
2183
|
cred = credential.Credential(
|
|
@@ -2109,7 +2229,10 @@ def doDescribeLogConfigs(args, parsed_globals):
|
|
|
2109
2229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2110
2230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2111
2231
|
)
|
|
2112
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2113
2236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2114
2237
|
else:
|
|
2115
2238
|
cred = credential.Credential(
|
|
@@ -2161,7 +2284,10 @@ def doInstallAddon(args, parsed_globals):
|
|
|
2161
2284
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2162
2285
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2163
2286
|
)
|
|
2164
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2287
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2289
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2290
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2165
2291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2166
2292
|
else:
|
|
2167
2293
|
cred = credential.Credential(
|
|
@@ -2213,7 +2339,10 @@ def doDeleteECMInstances(args, parsed_globals):
|
|
|
2213
2339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2214
2340
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2215
2341
|
)
|
|
2216
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2344
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2345
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2217
2346
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2218
2347
|
else:
|
|
2219
2348
|
cred = credential.Credential(
|
|
@@ -2265,7 +2394,10 @@ def doDescribeClusterNodePoolDetail(args, parsed_globals):
|
|
|
2265
2394
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2266
2395
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2267
2396
|
)
|
|
2268
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2397
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2399
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2400
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2269
2401
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2270
2402
|
else:
|
|
2271
2403
|
cred = credential.Credential(
|
|
@@ -2317,7 +2449,10 @@ def doDescribeClusterVirtualNodePools(args, parsed_globals):
|
|
|
2317
2449
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2318
2450
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2319
2451
|
)
|
|
2320
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2452
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2454
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2455
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2321
2456
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2322
2457
|
else:
|
|
2323
2458
|
cred = credential.Credential(
|
|
@@ -2369,7 +2504,10 @@ def doDescribeHealthCheckTemplate(args, parsed_globals):
|
|
|
2369
2504
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2370
2505
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2371
2506
|
)
|
|
2372
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2507
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2509
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2510
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2373
2511
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2374
2512
|
else:
|
|
2375
2513
|
cred = credential.Credential(
|
|
@@ -2421,7 +2559,10 @@ def doCreateClusterInstances(args, parsed_globals):
|
|
|
2421
2559
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2422
2560
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2423
2561
|
)
|
|
2424
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2562
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2564
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2565
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2425
2566
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2426
2567
|
else:
|
|
2427
2568
|
cred = credential.Credential(
|
|
@@ -2473,7 +2614,10 @@ def doModifyClusterAttribute(args, parsed_globals):
|
|
|
2473
2614
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2474
2615
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2475
2616
|
)
|
|
2476
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2617
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2619
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2620
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2477
2621
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2478
2622
|
else:
|
|
2479
2623
|
cred = credential.Credential(
|
|
@@ -2525,7 +2669,10 @@ def doDeleteClusterAsGroups(args, parsed_globals):
|
|
|
2525
2669
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2526
2670
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2527
2671
|
)
|
|
2528
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2672
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2674
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2675
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2529
2676
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2530
2677
|
else:
|
|
2531
2678
|
cred = credential.Credential(
|
|
@@ -2577,7 +2724,10 @@ def doDeleteClusterRoute(args, parsed_globals):
|
|
|
2577
2724
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2578
2725
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2579
2726
|
)
|
|
2580
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2727
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2729
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2730
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2581
2731
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2582
2732
|
else:
|
|
2583
2733
|
cred = credential.Credential(
|
|
@@ -2629,7 +2779,10 @@ def doAddVpcCniSubnets(args, parsed_globals):
|
|
|
2629
2779
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2630
2780
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2631
2781
|
)
|
|
2632
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2782
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2784
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2785
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2633
2786
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2634
2787
|
else:
|
|
2635
2788
|
cred = credential.Credential(
|
|
@@ -2681,7 +2834,10 @@ def doDescribeExistedInstances(args, parsed_globals):
|
|
|
2681
2834
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2682
2835
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2683
2836
|
)
|
|
2684
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2837
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2839
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2840
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2685
2841
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2686
2842
|
else:
|
|
2687
2843
|
cred = credential.Credential(
|
|
@@ -2733,7 +2889,10 @@ def doDescribeClusterNodePools(args, parsed_globals):
|
|
|
2733
2889
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2734
2890
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2735
2891
|
)
|
|
2736
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2892
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2894
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2895
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2737
2896
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2738
2897
|
else:
|
|
2739
2898
|
cred = credential.Credential(
|
|
@@ -2785,7 +2944,10 @@ def doDescribeTKEEdgeClusterCredential(args, parsed_globals):
|
|
|
2785
2944
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2786
2945
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2787
2946
|
)
|
|
2788
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2947
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2949
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2950
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2789
2951
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2790
2952
|
else:
|
|
2791
2953
|
cred = credential.Credential(
|
|
@@ -2837,7 +2999,10 @@ def doUpgradeClusterInstances(args, parsed_globals):
|
|
|
2837
2999
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2838
3000
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2839
3001
|
)
|
|
2840
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3002
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3004
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3005
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
3006
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
3007
|
else:
|
|
2843
3008
|
cred = credential.Credential(
|
|
@@ -2889,7 +3054,10 @@ def doDescribeClusterRouteTables(args, parsed_globals):
|
|
|
2889
3054
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2890
3055
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2891
3056
|
)
|
|
2892
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3057
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3059
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3060
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2893
3061
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2894
3062
|
else:
|
|
2895
3063
|
cred = credential.Credential(
|
|
@@ -2941,7 +3109,10 @@ def doDeleteEdgeCVMInstances(args, parsed_globals):
|
|
|
2941
3109
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2942
3110
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2943
3111
|
)
|
|
2944
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3112
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3114
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3115
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2945
3116
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2946
3117
|
else:
|
|
2947
3118
|
cred = credential.Credential(
|
|
@@ -2993,7 +3164,10 @@ def doAddNodeToNodePool(args, parsed_globals):
|
|
|
2993
3164
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2994
3165
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2995
3166
|
)
|
|
2996
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3167
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3169
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3170
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2997
3171
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2998
3172
|
else:
|
|
2999
3173
|
cred = credential.Credential(
|
|
@@ -3045,7 +3219,10 @@ def doModifyClusterTags(args, parsed_globals):
|
|
|
3045
3219
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3046
3220
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3047
3221
|
)
|
|
3048
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3222
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3224
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3225
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3049
3226
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3050
3227
|
else:
|
|
3051
3228
|
cred = credential.Credential(
|
|
@@ -3097,7 +3274,10 @@ def doDescribeClusterEndpointStatus(args, parsed_globals):
|
|
|
3097
3274
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3098
3275
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3099
3276
|
)
|
|
3100
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3277
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3279
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3280
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3101
3281
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3102
3282
|
else:
|
|
3103
3283
|
cred = credential.Credential(
|
|
@@ -3149,7 +3329,10 @@ def doDescribePrometheusInstance(args, parsed_globals):
|
|
|
3149
3329
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3150
3330
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3151
3331
|
)
|
|
3152
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3332
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3334
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3335
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3153
3336
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3154
3337
|
else:
|
|
3155
3338
|
cred = credential.Credential(
|
|
@@ -3201,7 +3384,10 @@ def doDescribeBatchModifyTagsStatus(args, parsed_globals):
|
|
|
3201
3384
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3202
3385
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3203
3386
|
)
|
|
3204
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3387
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3389
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3390
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3205
3391
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3206
3392
|
else:
|
|
3207
3393
|
cred = credential.Credential(
|
|
@@ -3253,7 +3439,10 @@ def doDescribeRegions(args, parsed_globals):
|
|
|
3253
3439
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3254
3440
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3255
3441
|
)
|
|
3256
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3442
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3444
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3445
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3257
3446
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3258
3447
|
else:
|
|
3259
3448
|
cred = credential.Credential(
|
|
@@ -3305,7 +3494,10 @@ def doDescribeReservedInstanceUtilizationRate(args, parsed_globals):
|
|
|
3305
3494
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3306
3495
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3307
3496
|
)
|
|
3308
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3497
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3499
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3500
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3309
3501
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3310
3502
|
else:
|
|
3311
3503
|
cred = credential.Credential(
|
|
@@ -3357,7 +3549,10 @@ def doAddExistedInstances(args, parsed_globals):
|
|
|
3357
3549
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3358
3550
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3359
3551
|
)
|
|
3360
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3552
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3554
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3555
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3361
3556
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3362
3557
|
else:
|
|
3363
3558
|
cred = credential.Credential(
|
|
@@ -3409,7 +3604,10 @@ def doCreateEdgeCVMInstances(args, parsed_globals):
|
|
|
3409
3604
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3410
3605
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3411
3606
|
)
|
|
3412
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3607
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3609
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3610
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3413
3611
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3414
3612
|
else:
|
|
3415
3613
|
cred = credential.Credential(
|
|
@@ -3461,7 +3659,10 @@ def doDisableClusterDeletionProtection(args, parsed_globals):
|
|
|
3461
3659
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3462
3660
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3463
3661
|
)
|
|
3464
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3662
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3664
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3665
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3465
3666
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3466
3667
|
else:
|
|
3467
3668
|
cred = credential.Credential(
|
|
@@ -3513,7 +3714,10 @@ def doDescribeLogSwitches(args, parsed_globals):
|
|
|
3513
3714
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3514
3715
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3515
3716
|
)
|
|
3516
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3717
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3719
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3720
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3517
3721
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3518
3722
|
else:
|
|
3519
3723
|
cred = credential.Credential(
|
|
@@ -3565,7 +3769,10 @@ def doDescribeClusterInstances(args, parsed_globals):
|
|
|
3565
3769
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3566
3770
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3567
3771
|
)
|
|
3568
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3772
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3774
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3775
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3569
3776
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3570
3777
|
else:
|
|
3571
3778
|
cred = credential.Credential(
|
|
@@ -3617,7 +3824,10 @@ def doDescribeEdgeCVMInstances(args, parsed_globals):
|
|
|
3617
3824
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3618
3825
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3619
3826
|
)
|
|
3620
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3827
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3829
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3830
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3621
3831
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3622
3832
|
else:
|
|
3623
3833
|
cred = credential.Credential(
|
|
@@ -3669,7 +3879,10 @@ def doDescribeClusterLevelAttribute(args, parsed_globals):
|
|
|
3669
3879
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3670
3880
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3671
3881
|
)
|
|
3672
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3882
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3884
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3885
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3673
3886
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3674
3887
|
else:
|
|
3675
3888
|
cred = credential.Credential(
|
|
@@ -3721,7 +3934,10 @@ def doDescribeAddonValues(args, parsed_globals):
|
|
|
3721
3934
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3722
3935
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3723
3936
|
)
|
|
3724
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3937
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3939
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3940
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3725
3941
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3726
3942
|
else:
|
|
3727
3943
|
cred = credential.Credential(
|
|
@@ -3773,7 +3989,10 @@ def doDeleteClusterVirtualNodePool(args, parsed_globals):
|
|
|
3773
3989
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3774
3990
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3775
3991
|
)
|
|
3776
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3992
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3994
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3995
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3777
3996
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3778
3997
|
else:
|
|
3779
3998
|
cred = credential.Credential(
|
|
@@ -3825,7 +4044,10 @@ def doDisableEncryptionProtection(args, parsed_globals):
|
|
|
3825
4044
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3826
4045
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3827
4046
|
)
|
|
3828
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4047
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4049
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4050
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3829
4051
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3830
4052
|
else:
|
|
3831
4053
|
cred = credential.Credential(
|
|
@@ -3877,7 +4099,10 @@ def doDeleteAddon(args, parsed_globals):
|
|
|
3877
4099
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3878
4100
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3879
4101
|
)
|
|
3880
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3881
4106
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3882
4107
|
else:
|
|
3883
4108
|
cred = credential.Credential(
|
|
@@ -3929,7 +4154,10 @@ def doCreateEksLogConfig(args, parsed_globals):
|
|
|
3929
4154
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3930
4155
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3931
4156
|
)
|
|
3932
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4157
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4159
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4160
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3933
4161
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3934
4162
|
else:
|
|
3935
4163
|
cred = credential.Credential(
|
|
@@ -3981,7 +4209,10 @@ def doDrainClusterVirtualNode(args, parsed_globals):
|
|
|
3981
4209
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3982
4210
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3983
4211
|
)
|
|
3984
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4212
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4214
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4215
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3985
4216
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3986
4217
|
else:
|
|
3987
4218
|
cred = credential.Credential(
|
|
@@ -4033,7 +4264,10 @@ def doCreateHealthCheckPolicy(args, parsed_globals):
|
|
|
4033
4264
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4034
4265
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4035
4266
|
)
|
|
4036
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4267
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4269
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4270
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4037
4271
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4038
4272
|
else:
|
|
4039
4273
|
cred = credential.Credential(
|
|
@@ -4085,7 +4319,10 @@ def doDescribeTKEEdgeScript(args, parsed_globals):
|
|
|
4085
4319
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4086
4320
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4087
4321
|
)
|
|
4088
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4322
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4324
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4325
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4089
4326
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4090
4327
|
else:
|
|
4091
4328
|
cred = credential.Credential(
|
|
@@ -4137,7 +4374,10 @@ def doDescribeClusterExtraArgs(args, parsed_globals):
|
|
|
4137
4374
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4138
4375
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4139
4376
|
)
|
|
4140
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4377
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4379
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4380
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4141
4381
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4142
4382
|
else:
|
|
4143
4383
|
cred = credential.Credential(
|
|
@@ -4189,7 +4429,10 @@ def doUpdateClusterKubeconfig(args, parsed_globals):
|
|
|
4189
4429
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4190
4430
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4191
4431
|
)
|
|
4192
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4432
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4434
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4435
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4193
4436
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4194
4437
|
else:
|
|
4195
4438
|
cred = credential.Credential(
|
|
@@ -4241,7 +4484,10 @@ def doDescribeVpcCniPodLimits(args, parsed_globals):
|
|
|
4241
4484
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4242
4485
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4243
4486
|
)
|
|
4244
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4487
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4489
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4490
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4245
4491
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4246
4492
|
else:
|
|
4247
4493
|
cred = credential.Credential(
|
|
@@ -4293,7 +4539,10 @@ def doCreateNodePool(args, parsed_globals):
|
|
|
4293
4539
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4294
4540
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4295
4541
|
)
|
|
4296
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4542
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4544
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4545
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4297
4546
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4298
4547
|
else:
|
|
4299
4548
|
cred = credential.Credential(
|
|
@@ -4345,7 +4594,10 @@ def doModifyClusterImage(args, parsed_globals):
|
|
|
4345
4594
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4346
4595
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4347
4596
|
)
|
|
4348
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4597
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4599
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4600
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4349
4601
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4350
4602
|
else:
|
|
4351
4603
|
cred = credential.Credential(
|
|
@@ -4397,7 +4649,10 @@ def doModifyClusterAsGroupAttribute(args, parsed_globals):
|
|
|
4397
4649
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4398
4650
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4399
4651
|
)
|
|
4400
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4652
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4654
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4655
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4401
4656
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4402
4657
|
else:
|
|
4403
4658
|
cred = credential.Credential(
|
|
@@ -4449,7 +4704,10 @@ def doEnableEncryptionProtection(args, parsed_globals):
|
|
|
4449
4704
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4450
4705
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4451
4706
|
)
|
|
4452
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4707
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4709
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4710
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4453
4711
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4454
4712
|
else:
|
|
4455
4713
|
cred = credential.Credential(
|
|
@@ -4501,7 +4759,10 @@ def doModifyClusterRuntimeConfig(args, parsed_globals):
|
|
|
4501
4759
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4502
4760
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4503
4761
|
)
|
|
4504
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4762
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4764
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4765
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4505
4766
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4506
4767
|
else:
|
|
4507
4768
|
cred = credential.Credential(
|
|
@@ -4553,7 +4814,10 @@ def doDescribeClusterEndpointVipStatus(args, parsed_globals):
|
|
|
4553
4814
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4554
4815
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4555
4816
|
)
|
|
4556
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4817
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4819
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4820
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4557
4821
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4558
4822
|
else:
|
|
4559
4823
|
cred = credential.Credential(
|
|
@@ -4605,7 +4869,10 @@ def doDescribeRouteTableConflicts(args, parsed_globals):
|
|
|
4605
4869
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4606
4870
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4607
4871
|
)
|
|
4608
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4872
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4874
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4875
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4609
4876
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4610
4877
|
else:
|
|
4611
4878
|
cred = credential.Credential(
|
|
@@ -4657,7 +4924,10 @@ def doAcquireClusterAdminRole(args, parsed_globals):
|
|
|
4657
4924
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4658
4925
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4659
4926
|
)
|
|
4660
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4927
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4929
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4930
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4661
4931
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4662
4932
|
else:
|
|
4663
4933
|
cred = credential.Credential(
|
|
@@ -4709,7 +4979,10 @@ def doUninstallEdgeLogAgent(args, parsed_globals):
|
|
|
4709
4979
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4710
4980
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4711
4981
|
)
|
|
4712
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4982
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4984
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4985
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4713
4986
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4714
4987
|
else:
|
|
4715
4988
|
cred = credential.Credential(
|
|
@@ -4761,7 +5034,10 @@ def doModifyClusterNodePool(args, parsed_globals):
|
|
|
4761
5034
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4762
5035
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4763
5036
|
)
|
|
4764
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5037
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5039
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5040
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4765
5041
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4766
5042
|
else:
|
|
4767
5043
|
cred = credential.Credential(
|
|
@@ -4813,7 +5089,10 @@ def doDescribeEncryptionStatus(args, parsed_globals):
|
|
|
4813
5089
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4814
5090
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4815
5091
|
)
|
|
4816
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5092
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5094
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5095
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4817
5096
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4818
5097
|
else:
|
|
4819
5098
|
cred = credential.Credential(
|
|
@@ -4865,7 +5144,10 @@ def doDeletePrometheusAlertRule(args, parsed_globals):
|
|
|
4865
5144
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4866
5145
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4867
5146
|
)
|
|
4868
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5147
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5149
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5150
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4869
5151
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4870
5152
|
else:
|
|
4871
5153
|
cred = credential.Credential(
|
|
@@ -4917,7 +5199,10 @@ def doDeleteClusterInstances(args, parsed_globals):
|
|
|
4917
5199
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4918
5200
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4919
5201
|
)
|
|
4920
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5202
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5204
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5205
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4921
5206
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4922
5207
|
else:
|
|
4923
5208
|
cred = credential.Credential(
|
|
@@ -4969,7 +5254,10 @@ def doDescribeClusterLevelChangeRecords(args, parsed_globals):
|
|
|
4969
5254
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4970
5255
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4971
5256
|
)
|
|
4972
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5257
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5259
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5260
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4973
5261
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4974
5262
|
else:
|
|
4975
5263
|
cred = credential.Credential(
|
|
@@ -5021,7 +5309,10 @@ def doCreateClusterEndpoint(args, parsed_globals):
|
|
|
5021
5309
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5022
5310
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5023
5311
|
)
|
|
5024
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5312
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5314
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5315
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5025
5316
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5026
5317
|
else:
|
|
5027
5318
|
cred = credential.Credential(
|
|
@@ -5073,7 +5364,10 @@ def doDescribeClusterStatus(args, parsed_globals):
|
|
|
5073
5364
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5074
5365
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5075
5366
|
)
|
|
5076
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5367
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5369
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5370
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5077
5371
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5078
5372
|
else:
|
|
5079
5373
|
cred = credential.Credential(
|
|
@@ -5125,7 +5419,10 @@ def doDeleteHealthCheckPolicy(args, parsed_globals):
|
|
|
5125
5419
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5126
5420
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5127
5421
|
)
|
|
5128
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5422
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5424
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5425
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5129
5426
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5130
5427
|
else:
|
|
5131
5428
|
cred = credential.Credential(
|
|
@@ -5177,7 +5474,10 @@ def doCreatePrometheusAlertRule(args, parsed_globals):
|
|
|
5177
5474
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5178
5475
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5179
5476
|
)
|
|
5180
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5477
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5479
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5480
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5181
5481
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5182
5482
|
else:
|
|
5183
5483
|
cred = credential.Credential(
|
|
@@ -5229,7 +5529,10 @@ def doDescribeBackupStorageLocations(args, parsed_globals):
|
|
|
5229
5529
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5230
5530
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5231
5531
|
)
|
|
5232
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5532
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5534
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5535
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5233
5536
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5234
5537
|
else:
|
|
5235
5538
|
cred = credential.Credential(
|
|
@@ -5281,7 +5584,10 @@ def doDescribeClusterSecurity(args, parsed_globals):
|
|
|
5281
5584
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5282
5585
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5283
5586
|
)
|
|
5284
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5587
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5589
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5590
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5285
5591
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5286
5592
|
else:
|
|
5287
5593
|
cred = credential.Credential(
|
|
@@ -5333,7 +5639,10 @@ def doDeleteClusterNodePool(args, parsed_globals):
|
|
|
5333
5639
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5334
5640
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5335
5641
|
)
|
|
5336
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5642
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5644
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5645
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5337
5646
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5338
5647
|
else:
|
|
5339
5648
|
cred = credential.Credential(
|
|
@@ -5385,7 +5694,10 @@ def doCreateTKEEdgeCluster(args, parsed_globals):
|
|
|
5385
5694
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5386
5695
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5387
5696
|
)
|
|
5388
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5697
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5699
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5700
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5389
5701
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5390
5702
|
else:
|
|
5391
5703
|
cred = credential.Credential(
|
|
@@ -5437,7 +5749,10 @@ def doDescribeResourceUsage(args, parsed_globals):
|
|
|
5437
5749
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5438
5750
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5439
5751
|
)
|
|
5440
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5752
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5754
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5755
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5441
5756
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5442
5757
|
else:
|
|
5443
5758
|
cred = credential.Credential(
|
|
@@ -5489,7 +5804,10 @@ def doDeleteClusterEndpointVip(args, parsed_globals):
|
|
|
5489
5804
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5490
5805
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5491
5806
|
)
|
|
5492
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5807
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5809
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5810
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5493
5811
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5494
5812
|
else:
|
|
5495
5813
|
cred = credential.Credential(
|
|
@@ -5541,7 +5859,10 @@ def doDescribeECMInstances(args, parsed_globals):
|
|
|
5541
5859
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5542
5860
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5543
5861
|
)
|
|
5544
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5862
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5864
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5865
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5545
5866
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5546
5867
|
else:
|
|
5547
5868
|
cred = credential.Credential(
|
|
@@ -5593,7 +5914,10 @@ def doDeleteTKEEdgeCluster(args, parsed_globals):
|
|
|
5593
5914
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5594
5915
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5595
5916
|
)
|
|
5596
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5917
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5919
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5920
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5597
5921
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5598
5922
|
else:
|
|
5599
5923
|
cred = credential.Credential(
|
|
@@ -5645,7 +5969,10 @@ def doDescribeClusterEndpoints(args, parsed_globals):
|
|
|
5645
5969
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5646
5970
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5647
5971
|
)
|
|
5648
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5972
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5974
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5975
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5649
5976
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5650
5977
|
else:
|
|
5651
5978
|
cred = credential.Credential(
|
|
@@ -5697,7 +6024,10 @@ def doModifyClusterEndpointSP(args, parsed_globals):
|
|
|
5697
6024
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5698
6025
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5699
6026
|
)
|
|
5700
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6027
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6028
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6029
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6030
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5701
6031
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5702
6032
|
else:
|
|
5703
6033
|
cred = credential.Credential(
|
|
@@ -5749,7 +6079,10 @@ def doDescribeClusterRoutes(args, parsed_globals):
|
|
|
5749
6079
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5750
6080
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5751
6081
|
)
|
|
5752
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6082
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6083
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6084
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6085
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5753
6086
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5754
6087
|
else:
|
|
5755
6088
|
cred = credential.Credential(
|
|
@@ -5801,7 +6134,10 @@ def doModifyNodePoolInstanceTypes(args, parsed_globals):
|
|
|
5801
6134
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5802
6135
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5803
6136
|
)
|
|
5804
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6137
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6138
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6139
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6140
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5805
6141
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5806
6142
|
else:
|
|
5807
6143
|
cred = credential.Credential(
|
|
@@ -5853,7 +6189,10 @@ def doCheckInstancesUpgradeAble(args, parsed_globals):
|
|
|
5853
6189
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5854
6190
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5855
6191
|
)
|
|
5856
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6192
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6193
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6194
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6195
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5857
6196
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5858
6197
|
else:
|
|
5859
6198
|
cred = credential.Credential(
|
|
@@ -5905,7 +6244,10 @@ def doDeleteNodePool(args, parsed_globals):
|
|
|
5905
6244
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5906
6245
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5907
6246
|
)
|
|
5908
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6247
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6248
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6249
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6250
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5909
6251
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5910
6252
|
else:
|
|
5911
6253
|
cred = credential.Credential(
|
|
@@ -5957,7 +6299,10 @@ def doDescribeHealthCheckPolicies(args, parsed_globals):
|
|
|
5957
6299
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5958
6300
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5959
6301
|
)
|
|
5960
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6302
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6303
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6304
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6305
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5961
6306
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5962
6307
|
else:
|
|
5963
6308
|
cred = credential.Credential(
|
|
@@ -6009,7 +6354,10 @@ def doDescribeImages(args, parsed_globals):
|
|
|
6009
6354
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6010
6355
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6011
6356
|
)
|
|
6012
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6357
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6358
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6359
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6360
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6013
6361
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6014
6362
|
else:
|
|
6015
6363
|
cred = credential.Credential(
|
|
@@ -6061,7 +6409,10 @@ def doModifyClusterAuthenticationOptions(args, parsed_globals):
|
|
|
6061
6409
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6062
6410
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6063
6411
|
)
|
|
6064
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6412
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6413
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6414
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6415
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6065
6416
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6066
6417
|
else:
|
|
6067
6418
|
cred = credential.Credential(
|
|
@@ -6113,7 +6464,10 @@ def doDeleteClusterEndpoint(args, parsed_globals):
|
|
|
6113
6464
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6114
6465
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6115
6466
|
)
|
|
6116
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6467
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6468
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6469
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6470
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6117
6471
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6118
6472
|
else:
|
|
6119
6473
|
cred = credential.Credential(
|
|
@@ -6165,7 +6519,10 @@ def doGetClusterLevelPrice(args, parsed_globals):
|
|
|
6165
6519
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6166
6520
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6167
6521
|
)
|
|
6168
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6522
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6523
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6524
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6525
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6169
6526
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6170
6527
|
else:
|
|
6171
6528
|
cred = credential.Credential(
|
|
@@ -6217,7 +6574,10 @@ def doRemoveNodeFromNodePool(args, parsed_globals):
|
|
|
6217
6574
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6218
6575
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6219
6576
|
)
|
|
6220
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6577
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6578
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6579
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6580
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6221
6581
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6222
6582
|
else:
|
|
6223
6583
|
cred = credential.Credential(
|
|
@@ -6269,7 +6629,10 @@ def doDescribeClusterKubeconfig(args, parsed_globals):
|
|
|
6269
6629
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6270
6630
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6271
6631
|
)
|
|
6272
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6632
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6633
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6634
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6635
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6273
6636
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6274
6637
|
else:
|
|
6275
6638
|
cred = credential.Credential(
|
|
@@ -6321,7 +6684,10 @@ def doDescribeEdgeClusterUpgradeInfo(args, parsed_globals):
|
|
|
6321
6684
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6322
6685
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6323
6686
|
)
|
|
6324
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6687
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6688
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6689
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6690
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6325
6691
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6326
6692
|
else:
|
|
6327
6693
|
cred = credential.Credential(
|
|
@@ -6373,7 +6739,10 @@ def doDeleteLogConfigs(args, parsed_globals):
|
|
|
6373
6739
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6374
6740
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6375
6741
|
)
|
|
6376
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6742
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6743
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6744
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6745
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6377
6746
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6378
6747
|
else:
|
|
6379
6748
|
cred = credential.Credential(
|
|
@@ -6425,7 +6794,10 @@ def doDescribeEdgeClusterInstances(args, parsed_globals):
|
|
|
6425
6794
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6426
6795
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6427
6796
|
)
|
|
6428
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6797
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6798
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6799
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6800
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6429
6801
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6430
6802
|
else:
|
|
6431
6803
|
cred = credential.Credential(
|
|
@@ -6477,7 +6849,10 @@ def doDescribeClusterAsGroupOption(args, parsed_globals):
|
|
|
6477
6849
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6478
6850
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6479
6851
|
)
|
|
6480
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6852
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6853
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6854
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6855
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6481
6856
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6482
6857
|
else:
|
|
6483
6858
|
cred = credential.Credential(
|
|
@@ -6529,7 +6904,10 @@ def doInstallEdgeLogAgent(args, parsed_globals):
|
|
|
6529
6904
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6530
6905
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6531
6906
|
)
|
|
6532
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6907
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6908
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6909
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6910
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6533
6911
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6534
6912
|
else:
|
|
6535
6913
|
cred = credential.Credential(
|
|
@@ -6581,7 +6959,10 @@ def doUpdateClusterVersion(args, parsed_globals):
|
|
|
6581
6959
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6582
6960
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6583
6961
|
)
|
|
6584
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6962
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6963
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6964
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6965
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6585
6966
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6586
6967
|
else:
|
|
6587
6968
|
cred = credential.Credential(
|
|
@@ -6633,7 +7014,10 @@ def doCreateEdgeLogConfig(args, parsed_globals):
|
|
|
6633
7014
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6634
7015
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6635
7016
|
)
|
|
6636
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7017
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7018
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7019
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7020
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6637
7021
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6638
7022
|
else:
|
|
6639
7023
|
cred = credential.Credential(
|
|
@@ -6685,7 +7069,10 @@ def doDescribeEnableVpcCniProgress(args, parsed_globals):
|
|
|
6685
7069
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6686
7070
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6687
7071
|
)
|
|
6688
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7072
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7073
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7074
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7075
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6689
7076
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6690
7077
|
else:
|
|
6691
7078
|
cred = credential.Credential(
|
|
@@ -6737,7 +7124,10 @@ def doModifyNodePool(args, parsed_globals):
|
|
|
6737
7124
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6738
7125
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6739
7126
|
)
|
|
6740
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7127
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7128
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7129
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7130
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6741
7131
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6742
7132
|
else:
|
|
6743
7133
|
cred = credential.Credential(
|
|
@@ -6789,7 +7179,10 @@ def doForwardTKEEdgeApplicationRequestV3(args, parsed_globals):
|
|
|
6789
7179
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6790
7180
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6791
7181
|
)
|
|
6792
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7182
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7183
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7184
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7185
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6793
7186
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6794
7187
|
else:
|
|
6795
7188
|
cred = credential.Credential(
|
|
@@ -6841,7 +7234,10 @@ def doEnableClusterDeletionProtection(args, parsed_globals):
|
|
|
6841
7234
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6842
7235
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6843
7236
|
)
|
|
6844
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7237
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7238
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7239
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7240
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6845
7241
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6846
7242
|
else:
|
|
6847
7243
|
cred = credential.Credential(
|
|
@@ -6893,7 +7289,10 @@ def doDescribeAddon(args, parsed_globals):
|
|
|
6893
7289
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6894
7290
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6895
7291
|
)
|
|
6896
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7292
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7293
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7294
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7295
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6897
7296
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6898
7297
|
else:
|
|
6899
7298
|
cred = credential.Credential(
|
|
@@ -6945,7 +7344,10 @@ def doDescribeNodePools(args, parsed_globals):
|
|
|
6945
7344
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6946
7345
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6947
7346
|
)
|
|
6948
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7347
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7348
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7349
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7350
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6949
7351
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6950
7352
|
else:
|
|
6951
7353
|
cred = credential.Credential(
|
|
@@ -6997,7 +7399,10 @@ def doGetTkeAppChartList(args, parsed_globals):
|
|
|
6997
7399
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6998
7400
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6999
7401
|
)
|
|
7000
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7402
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7403
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7404
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7405
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7001
7406
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7002
7407
|
else:
|
|
7003
7408
|
cred = credential.Credential(
|
|
@@ -7049,7 +7454,10 @@ def doCreateClusterVirtualNode(args, parsed_globals):
|
|
|
7049
7454
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7050
7455
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7051
7456
|
)
|
|
7052
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7457
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7458
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7459
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7460
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7053
7461
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7054
7462
|
else:
|
|
7055
7463
|
cred = credential.Credential(
|
|
@@ -7101,7 +7509,10 @@ def doCheckEdgeClusterCIDR(args, parsed_globals):
|
|
|
7101
7509
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7102
7510
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7103
7511
|
)
|
|
7104
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7512
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7513
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7514
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7515
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7105
7516
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7106
7517
|
else:
|
|
7107
7518
|
cred = credential.Credential(
|
|
@@ -7153,7 +7564,10 @@ def doCreateClusterEndpointVip(args, parsed_globals):
|
|
|
7153
7564
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7154
7565
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7155
7566
|
)
|
|
7156
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7567
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7568
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7569
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7570
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7157
7571
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7158
7572
|
else:
|
|
7159
7573
|
cred = credential.Credential(
|