tccli-intl-en 3.0.1237.1__py2.py3-none-any.whl → 3.0.1282.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (214) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/__init__.py +17 -1
  3. tccli/services/advisor/advisor_client.py +8 -2
  4. tccli/services/aiart/aiart_client.py +4 -1
  5. tccli/services/ams/ams_client.py +16 -4
  6. tccli/services/antiddos/antiddos_client.py +280 -70
  7. tccli/services/apigateway/apigateway_client.py +372 -93
  8. tccli/services/apm/apm_client.py +52 -13
  9. tccli/services/asr/asr_client.py +8 -2
  10. tccli/services/autoscaling/autoscaling_client.py +232 -58
  11. tccli/services/autoscaling/v20180419/api.json +1 -1
  12. tccli/services/batch/batch_client.py +112 -28
  13. tccli/services/bi/bi_client.py +1242 -4
  14. tccli/services/bi/v20220105/api.json +5340 -107
  15. tccli/services/bi/v20220105/examples.json +196 -1
  16. tccli/services/billing/billing_client.py +168 -42
  17. tccli/services/cam/cam_client.py +324 -81
  18. tccli/services/captcha/captcha_client.py +4 -1
  19. tccli/services/car/car_client.py +132 -33
  20. tccli/services/cbs/cbs_client.py +152 -38
  21. tccli/services/ccc/ccc_client.py +732 -98
  22. tccli/services/ccc/v20200210/api.json +1727 -196
  23. tccli/services/ccc/v20200210/examples.json +64 -0
  24. tccli/services/cdb/cdb_client.py +532 -133
  25. tccli/services/cdc/cdc_client.py +80 -20
  26. tccli/services/cdc/v20201214/api.json +2 -2
  27. tccli/services/cdc/v20201214/examples.json +4 -4
  28. tccli/services/cdn/cdn_client.py +176 -44
  29. tccli/services/cdwdoris/cdwdoris_client.py +308 -77
  30. tccli/services/cdwpg/cdwpg_client.py +96 -24
  31. tccli/services/cdz/__init__.py +4 -0
  32. tccli/services/cdz/cdz_client.py +210 -0
  33. tccli/services/cdz/v20221123/api.json +233 -0
  34. tccli/services/cdz/v20221123/examples.json +12 -0
  35. tccli/services/cfg/cfg_client.py +64 -16
  36. tccli/services/cfs/cfs_client.py +156 -39
  37. tccli/services/cfw/cfw_client.py +264 -66
  38. tccli/services/chdfs/chdfs_client.py +116 -29
  39. tccli/services/ciam/ciam_client.py +64 -16
  40. tccli/services/ckafka/ckafka_client.py +575 -77
  41. tccli/services/ckafka/v20190819/api.json +2749 -1470
  42. tccli/services/ckafka/v20190819/examples.json +209 -155
  43. tccli/services/clb/clb_client.py +332 -83
  44. tccli/services/clb/v20180317/api.json +29 -14
  45. tccli/services/cloudaudit/cloudaudit_client.py +72 -18
  46. tccli/services/cls/cls_client.py +348 -87
  47. tccli/services/cmq/cmq_client.py +12 -801
  48. tccli/services/cmq/v20190304/api.json +173 -1367
  49. tccli/services/cmq/v20190304/examples.json +0 -120
  50. tccli/services/config/config_client.py +24 -6
  51. tccli/services/controlcenter/controlcenter_client.py +4 -1
  52. tccli/services/csip/csip_client.py +136 -34
  53. tccli/services/ctsdb/ctsdb_client.py +8 -2
  54. tccli/services/cvm/cvm_client.py +627 -110
  55. tccli/services/cvm/v20170312/api.json +750 -340
  56. tccli/services/cvm/v20170312/examples.json +105 -59
  57. tccli/services/cwp/cwp_client.py +1860 -465
  58. tccli/services/cynosdb/cynosdb_client.py +1749 -439
  59. tccli/services/cynosdb/v20190107/api.json +11763 -7697
  60. tccli/services/cynosdb/v20190107/examples.json +132 -4
  61. tccli/services/dataintegration/dataintegration_client.py +4 -1
  62. tccli/services/dayu/dayu_client.py +412 -103
  63. tccli/services/dbbrain/dbbrain_client.py +168 -42
  64. tccli/services/dc/dc_client.py +72 -18
  65. tccli/services/dcdb/dcdb_client.py +248 -62
  66. tccli/services/dlc/dlc_client.py +756 -111
  67. tccli/services/dlc/v20210125/api.json +637 -13
  68. tccli/services/dlc/v20210125/examples.json +48 -0
  69. tccli/services/dms/dms_client.py +8 -2
  70. tccli/services/dnspod/dnspod_client.py +353 -74
  71. tccli/services/dnspod/v20210323/api.json +196 -0
  72. tccli/services/dnspod/v20210323/examples.json +24 -0
  73. tccli/services/domain/domain_client.py +96 -24
  74. tccli/services/dts/dts_client.py +332 -83
  75. tccli/services/eb/eb_client.py +104 -26
  76. tccli/services/ecdn/ecdn_client.py +60 -15
  77. tccli/services/ecm/ecm_client.py +496 -124
  78. tccli/services/eiam/eiam_client.py +160 -40
  79. tccli/services/emr/emr_client.py +2784 -115
  80. tccli/services/emr/v20190103/api.json +14647 -4756
  81. tccli/services/emr/v20190103/examples.json +408 -40
  82. tccli/services/es/es_client.py +84 -21
  83. tccli/services/facefusion/facefusion_client.py +12 -3
  84. tccli/services/faceid/faceid_client.py +76 -19
  85. tccli/services/faceid/v20180301/api.json +79 -14
  86. tccli/services/faceid/v20180301/examples.json +3 -3
  87. tccli/services/gaap/gaap_client.py +352 -88
  88. tccli/services/gme/gme_client.py +40 -10
  89. tccli/services/gpm/gpm_client.py +72 -18
  90. tccli/services/gse/gse_client.py +88 -22
  91. tccli/services/gwlb/gwlb_client.py +72 -18
  92. tccli/services/iai/iai_client.py +116 -29
  93. tccli/services/iap/iap_client.py +24 -6
  94. tccli/services/ims/ims_client.py +4 -1
  95. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +168 -42
  96. tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
  97. tccli/services/iotcloud/iotcloud_client.py +80 -20
  98. tccli/services/ip/ip_client.py +24 -6
  99. tccli/services/kms/kms_client.py +272 -68
  100. tccli/services/lcic/lcic_client.py +212 -53
  101. tccli/services/lighthouse/lighthouse_client.py +296 -74
  102. tccli/services/lighthouse/v20200324/api.json +14 -14
  103. tccli/services/lighthouse/v20200324/examples.json +5 -5
  104. tccli/services/live/live_client.py +480 -120
  105. tccli/services/lke/lke_client.py +360 -90
  106. tccli/services/lke/v20231130/api.json +182 -39
  107. tccli/services/lkeap/__init__.py +4 -0
  108. tccli/services/lkeap/lkeap_client.py +546 -0
  109. tccli/services/lkeap/v20240522/api.json +855 -0
  110. tccli/services/lkeap/v20240522/examples.json +72 -0
  111. tccli/services/mariadb/mariadb_client.py +200 -50
  112. tccli/services/mdc/mdc_client.py +72 -18
  113. tccli/services/mdl/mdl_client.py +132 -33
  114. tccli/services/mdl/v20200326/api.json +186 -12
  115. tccli/services/mdl/v20200326/examples.json +16 -16
  116. tccli/services/mdp/mdp_client.py +680 -70
  117. tccli/services/mdp/v20200527/api.json +748 -23
  118. tccli/services/mdp/v20200527/examples.json +143 -79
  119. tccli/services/message/__init__.py +4 -0
  120. tccli/services/message/message_client.py +210 -0
  121. tccli/services/message/v20181225/api.json +72 -0
  122. tccli/services/message/v20181225/examples.json +13 -0
  123. tccli/services/mongodb/mongodb_client.py +340 -29
  124. tccli/services/mongodb/v20190725/api.json +811 -226
  125. tccli/services/mongodb/v20190725/examples.json +54 -22
  126. tccli/services/monitor/monitor_client.py +864 -152
  127. tccli/services/monitor/v20180724/api.json +657 -8
  128. tccli/services/monitor/v20180724/examples.json +152 -4
  129. tccli/services/mps/mps_client.py +592 -92
  130. tccli/services/mps/v20190612/api.json +2931 -399
  131. tccli/services/mps/v20190612/examples.json +64 -14
  132. tccli/services/msp/msp_client.py +28 -7
  133. tccli/services/ocr/ocr_client.py +212 -45
  134. tccli/services/ocr/v20181119/api.json +872 -112
  135. tccli/services/ocr/v20181119/examples.json +12 -4
  136. tccli/services/omics/omics_client.py +80 -20
  137. tccli/services/organization/organization_client.py +464 -116
  138. tccli/services/postgres/postgres_client.py +364 -91
  139. tccli/services/postgres/v20170312/api.json +134 -109
  140. tccli/services/postgres/v20170312/examples.json +14 -14
  141. tccli/services/privatedns/privatedns_client.py +124 -31
  142. tccli/services/pts/pts_client.py +192 -48
  143. tccli/services/quota/__init__.py +4 -0
  144. tccli/services/quota/quota_client.py +434 -0
  145. tccli/services/quota/v20241204/api.json +548 -0
  146. tccli/services/quota/v20241204/examples.json +51 -0
  147. tccli/services/rce/rce_client.py +4 -1
  148. tccli/services/redis/redis_client.py +592 -106
  149. tccli/services/redis/v20180412/api.json +636 -240
  150. tccli/services/redis/v20180412/examples.json +98 -56
  151. tccli/services/region/region_client.py +12 -3
  152. tccli/services/rum/rum_client.py +240 -60
  153. tccli/services/scf/scf_client.py +168 -42
  154. tccli/services/ses/ses_client.py +116 -29
  155. tccli/services/sms/sms_client.py +72 -18
  156. tccli/services/sqlserver/sqlserver_client.py +3772 -387
  157. tccli/services/sqlserver/v20180328/api.json +9760 -3380
  158. tccli/services/sqlserver/v20180328/examples.json +478 -18
  159. tccli/services/ssl/ssl_client.py +152 -38
  160. tccli/services/ssm/ssm_client.py +96 -24
  161. tccli/services/sts/sts_client.py +20 -5
  162. tccli/services/tag/tag_client.py +120 -30
  163. tccli/services/tat/tat_client.py +76 -19
  164. tccli/services/tbaas/tbaas_client.py +16 -4
  165. tccli/services/tcaplusdb/tcaplusdb_client.py +208 -52
  166. tccli/services/tcaplusdb/v20190823/api.json +836 -760
  167. tccli/services/tcaplusdb/v20190823/examples.json +3 -3
  168. tccli/services/tchd/tchd_client.py +4 -1
  169. tccli/services/tcmpp/tcmpp_client.py +416 -104
  170. tccli/services/tcr/tcr_client.py +304 -76
  171. tccli/services/tcsas/tcsas_client.py +236 -59
  172. tccli/services/tcsas/v20250106/api.json +155 -79
  173. tccli/services/tcsas/v20250106/examples.json +3 -3
  174. tccli/services/tcss/tcss_client.py +1320 -330
  175. tccli/services/tdid/tdid_client.py +192 -48
  176. tccli/services/tdmq/tdmq_client.py +376 -94
  177. tccli/services/tem/tem_client.py +224 -56
  178. tccli/services/teo/teo_client.py +1127 -245
  179. tccli/services/teo/v20220901/api.json +382 -58
  180. tccli/services/teo/v20220901/examples.json +24 -0
  181. tccli/services/tione/__init__.py +4 -0
  182. tccli/services/tione/tione_client.py +210 -0
  183. tccli/services/tione/v20211111/api.json +3074 -0
  184. tccli/services/tione/v20211111/examples.json +12 -0
  185. tccli/services/tiw/tiw_client.py +204 -51
  186. tccli/services/tke/tke_client.py +552 -138
  187. tccli/services/tms/tms_client.py +4 -1
  188. tccli/services/tmt/tmt_client.py +4 -1
  189. tccli/services/trabbit/trabbit_client.py +116 -29
  190. tccli/services/trro/trro_client.py +76 -19
  191. tccli/services/trtc/trtc_client.py +420 -55
  192. tccli/services/trtc/v20190722/api.json +685 -23
  193. tccli/services/trtc/v20190722/examples.json +39 -7
  194. tccli/services/tts/tts_client.py +4 -1
  195. tccli/services/vclm/vclm_client.py +8 -2
  196. tccli/services/vm/vm_client.py +16 -4
  197. tccli/services/vod/v20180717/examples.json +1 -1
  198. tccli/services/vod/vod_client.py +716 -179
  199. tccli/services/vpc/v20170312/api.json +970 -75
  200. tccli/services/vpc/v20170312/examples.json +106 -10
  201. tccli/services/vpc/vpc_client.py +1876 -361
  202. tccli/services/waf/v20180125/api.json +1372 -194
  203. tccli/services/waf/v20180125/examples.json +89 -1
  204. tccli/services/waf/waf_client.py +1051 -147
  205. tccli/services/wedata/v20250806/api.json +13644 -0
  206. tccli/services/wedata/v20250806/examples.json +621 -0
  207. tccli/services/wedata/wedata_client.py +5830 -1026
  208. tccli/services/yunjing/yunjing_client.py +284 -71
  209. {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/METADATA +4 -7
  210. {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/RECORD +214 -192
  211. {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/WHEEL +1 -1
  212. {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/entry_points.txt +0 -1
  213. {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/LICENSE +0 -0
  214. {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,10 @@ def doCreateTask(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -79,7 +82,10 @@ def doAddUsersToWorkGroup(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -131,7 +137,10 @@ def doDescribeTaskResult(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -183,7 +192,10 @@ def doDescribeForbiddenTablePro(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -235,7 +247,10 @@ def doDescribeUserRoles(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -287,7 +302,10 @@ def doModifyUserType(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -339,7 +357,10 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -381,6 +402,61 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
381
402
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
403
 
383
404
 
405
+ def doDescribeDataMaskStrategies(args, parsed_globals):
406
+ g_param = parse_global_arg(parsed_globals)
407
+
408
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
409
+ cred = credential.CVMRoleCredential()
410
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
411
+ cred = credential.STSAssumeRoleCredential(
412
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
413
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
414
+ )
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
419
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
420
+ else:
421
+ cred = credential.Credential(
422
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
423
+ )
424
+ http_profile = HttpProfile(
425
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
426
+ reqMethod="POST",
427
+ endpoint=g_param[OptionsDefine.Endpoint],
428
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
429
+ )
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
431
+ if g_param[OptionsDefine.Language]:
432
+ profile.language = g_param[OptionsDefine.Language]
433
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
434
+ client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
435
+ client._sdkVersion += ("_CLI_" + __version__)
436
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
437
+ model = models.DescribeDataMaskStrategiesRequest()
438
+ model.from_json_string(json.dumps(args))
439
+ start_time = time.time()
440
+ while True:
441
+ rsp = client.DescribeDataMaskStrategies(model)
442
+ result = rsp.to_json_string()
443
+ try:
444
+ json_obj = json.loads(result)
445
+ except TypeError as e:
446
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
447
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
448
+ break
449
+ cur_time = time.time()
450
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
451
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
452
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
453
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
454
+ else:
455
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
456
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
457
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
458
+
459
+
384
460
  def doDeleteWorkGroup(args, parsed_globals):
385
461
  g_param = parse_global_arg(parsed_globals)
386
462
 
@@ -391,7 +467,10 @@ def doDeleteWorkGroup(args, parsed_globals):
391
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
469
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
475
  else:
397
476
  cred = credential.Credential(
@@ -443,7 +522,10 @@ def doDescribeDataEngine(args, parsed_globals):
443
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
524
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
530
  else:
449
531
  cred = credential.Credential(
@@ -495,7 +577,10 @@ def doCreateStoreLocation(args, parsed_globals):
495
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
579
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
585
  else:
501
586
  cred = credential.Credential(
@@ -547,7 +632,10 @@ def doSwitchDataEngine(args, parsed_globals):
547
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
634
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
640
  else:
553
641
  cred = credential.Credential(
@@ -599,7 +687,10 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
599
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
689
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
695
  else:
605
696
  cred = credential.Credential(
@@ -641,6 +732,61 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
641
732
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
733
 
643
734
 
735
+ def doDeleteDataMaskStrategy(args, parsed_globals):
736
+ g_param = parse_global_arg(parsed_globals)
737
+
738
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
739
+ cred = credential.CVMRoleCredential()
740
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
741
+ cred = credential.STSAssumeRoleCredential(
742
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
743
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
744
+ )
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
749
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
750
+ else:
751
+ cred = credential.Credential(
752
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
753
+ )
754
+ http_profile = HttpProfile(
755
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
756
+ reqMethod="POST",
757
+ endpoint=g_param[OptionsDefine.Endpoint],
758
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
759
+ )
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
761
+ if g_param[OptionsDefine.Language]:
762
+ profile.language = g_param[OptionsDefine.Language]
763
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
764
+ client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
765
+ client._sdkVersion += ("_CLI_" + __version__)
766
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
767
+ model = models.DeleteDataMaskStrategyRequest()
768
+ model.from_json_string(json.dumps(args))
769
+ start_time = time.time()
770
+ while True:
771
+ rsp = client.DeleteDataMaskStrategy(model)
772
+ result = rsp.to_json_string()
773
+ try:
774
+ json_obj = json.loads(result)
775
+ except TypeError as e:
776
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
777
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
778
+ break
779
+ cur_time = time.time()
780
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
781
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
782
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
783
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
784
+ else:
785
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
786
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
787
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
788
+
789
+
644
790
  def doDescribeDLCCatalogAccess(args, parsed_globals):
645
791
  g_param = parse_global_arg(parsed_globals)
646
792
 
@@ -651,7 +797,10 @@ def doDescribeDLCCatalogAccess(args, parsed_globals):
651
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
799
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
805
  else:
657
806
  cred = credential.Credential(
@@ -703,7 +852,10 @@ def doDescribeUserType(args, parsed_globals):
703
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
854
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
860
  else:
709
861
  cred = credential.Credential(
@@ -755,7 +907,10 @@ def doDescribeTasks(args, parsed_globals):
755
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
909
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
915
  else:
761
916
  cred = credential.Credential(
@@ -807,7 +962,10 @@ def doDescribeTaskStatistics(args, parsed_globals):
807
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
964
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
970
  else:
813
971
  cred = credential.Credential(
@@ -859,7 +1017,10 @@ def doSwitchDataEngineImage(args, parsed_globals):
859
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
1019
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
1025
  else:
865
1026
  cred = credential.Credential(
@@ -911,7 +1072,10 @@ def doCreateSparkAppTask(args, parsed_globals):
911
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1074
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1080
  else:
917
1081
  cred = credential.Credential(
@@ -963,7 +1127,10 @@ def doDropDLCTable(args, parsed_globals):
963
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1129
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1135
  else:
969
1136
  cred = credential.Credential(
@@ -1015,7 +1182,10 @@ def doDescribeOtherCHDFSBindingList(args, parsed_globals):
1015
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1184
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1190
  else:
1021
1191
  cred = credential.Credential(
@@ -1067,7 +1237,10 @@ def doDescribeLakeFsDirSummary(args, parsed_globals):
1067
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1239
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1245
  else:
1073
1246
  cred = credential.Credential(
@@ -1119,7 +1292,10 @@ def doCheckGrantedPermission(args, parsed_globals):
1119
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1294
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1300
  else:
1125
1301
  cred = credential.Credential(
@@ -1171,7 +1347,10 @@ def doRevokeDLCCatalogAccess(args, parsed_globals):
1171
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1349
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1355
  else:
1177
1356
  cred = credential.Credential(
@@ -1223,7 +1402,10 @@ def doCreateUser(args, parsed_globals):
1223
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1404
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1410
  else:
1229
1411
  cred = credential.Credential(
@@ -1265,6 +1447,61 @@ def doCreateUser(args, parsed_globals):
1265
1447
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
1448
 
1267
1449
 
1450
+ def doDescribeSparkAppTasks(args, parsed_globals):
1451
+ g_param = parse_global_arg(parsed_globals)
1452
+
1453
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1454
+ cred = credential.CVMRoleCredential()
1455
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1456
+ cred = credential.STSAssumeRoleCredential(
1457
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1458
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1459
+ )
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1464
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1465
+ else:
1466
+ cred = credential.Credential(
1467
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1468
+ )
1469
+ http_profile = HttpProfile(
1470
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1471
+ reqMethod="POST",
1472
+ endpoint=g_param[OptionsDefine.Endpoint],
1473
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1474
+ )
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1476
+ if g_param[OptionsDefine.Language]:
1477
+ profile.language = g_param[OptionsDefine.Language]
1478
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1479
+ client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
1480
+ client._sdkVersion += ("_CLI_" + __version__)
1481
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1482
+ model = models.DescribeSparkAppTasksRequest()
1483
+ model.from_json_string(json.dumps(args))
1484
+ start_time = time.time()
1485
+ while True:
1486
+ rsp = client.DescribeSparkAppTasks(model)
1487
+ result = rsp.to_json_string()
1488
+ try:
1489
+ json_obj = json.loads(result)
1490
+ except TypeError as e:
1491
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1492
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1493
+ break
1494
+ cur_time = time.time()
1495
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1496
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1497
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1498
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1499
+ else:
1500
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1501
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1502
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1503
+
1504
+
1268
1505
  def doDescribeDataEngineImageVersions(args, parsed_globals):
1269
1506
  g_param = parse_global_arg(parsed_globals)
1270
1507
 
@@ -1275,7 +1512,10 @@ def doDescribeDataEngineImageVersions(args, parsed_globals):
1275
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1514
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1520
  else:
1281
1521
  cred = credential.Credential(
@@ -1327,7 +1567,10 @@ def doDescribeAdvancedStoreLocation(args, parsed_globals):
1327
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1569
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1575
  else:
1333
1576
  cred = credential.Credential(
@@ -1379,7 +1622,10 @@ def doDescribeSparkAppJobs(args, parsed_globals):
1379
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1624
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1630
  else:
1385
1631
  cred = credential.Credential(
@@ -1431,7 +1677,10 @@ def doDescribeUsers(args, parsed_globals):
1431
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1679
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1685
  else:
1437
1686
  cred = credential.Credential(
@@ -1483,7 +1732,10 @@ def doCreateTasks(args, parsed_globals):
1483
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1734
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1740
  else:
1489
1741
  cred = credential.Credential(
@@ -1535,7 +1787,10 @@ def doDescribeDMSDatabaseList(args, parsed_globals):
1535
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1789
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1795
  else:
1541
1796
  cred = credential.Credential(
@@ -1587,7 +1842,10 @@ def doModifyWorkGroup(args, parsed_globals):
1587
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1844
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1850
  else:
1593
1851
  cred = credential.Credential(
@@ -1639,7 +1897,10 @@ def doDescribeTablesName(args, parsed_globals):
1639
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1899
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1905
  else:
1645
1906
  cred = credential.Credential(
@@ -1691,7 +1952,10 @@ def doDeleteCHDFSBindingProduct(args, parsed_globals):
1691
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1954
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1960
  else:
1697
1961
  cred = credential.Credential(
@@ -1743,7 +2007,10 @@ def doDescribeUpdatableDataEngines(args, parsed_globals):
1743
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
2009
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
2015
  else:
1749
2016
  cred = credential.Credential(
@@ -1795,7 +2062,10 @@ def doCreateInternalTable(args, parsed_globals):
1795
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
2064
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
2070
  else:
1801
2071
  cred = credential.Credential(
@@ -1847,7 +2117,10 @@ def doGenerateCreateMangedTableSql(args, parsed_globals):
1847
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2119
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2125
  else:
1853
2126
  cred = credential.Credential(
@@ -1899,7 +2172,10 @@ def doAttachWorkGroupPolicy(args, parsed_globals):
1899
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2174
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2180
  else:
1905
2181
  cred = credential.Credential(
@@ -1951,7 +2227,10 @@ def doDescribeDataEnginesScaleDetail(args, parsed_globals):
1951
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2229
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2235
  else:
1957
2236
  cred = credential.Credential(
@@ -2003,7 +2282,10 @@ def doCreateSparkApp(args, parsed_globals):
2003
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2284
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2290
  else:
2009
2291
  cred = credential.Credential(
@@ -2055,7 +2337,10 @@ def doDescribeThirdPartyAccessUser(args, parsed_globals):
2055
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2339
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2345
  else:
2061
2346
  cred = credential.Credential(
@@ -2107,7 +2392,10 @@ def doRollbackDataEngineImage(args, parsed_globals):
2107
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2394
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2400
  else:
2113
2401
  cred = credential.Credential(
@@ -2149,6 +2437,61 @@ def doRollbackDataEngineImage(args, parsed_globals):
2149
2437
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2150
2438
 
2151
2439
 
2440
+ def doDescribeSessionImageVersion(args, parsed_globals):
2441
+ g_param = parse_global_arg(parsed_globals)
2442
+
2443
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2444
+ cred = credential.CVMRoleCredential()
2445
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2446
+ cred = credential.STSAssumeRoleCredential(
2447
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2448
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2449
+ )
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2454
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2455
+ else:
2456
+ cred = credential.Credential(
2457
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2458
+ )
2459
+ http_profile = HttpProfile(
2460
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2461
+ reqMethod="POST",
2462
+ endpoint=g_param[OptionsDefine.Endpoint],
2463
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2464
+ )
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2466
+ if g_param[OptionsDefine.Language]:
2467
+ profile.language = g_param[OptionsDefine.Language]
2468
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2469
+ client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
2470
+ client._sdkVersion += ("_CLI_" + __version__)
2471
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2472
+ model = models.DescribeSessionImageVersionRequest()
2473
+ model.from_json_string(json.dumps(args))
2474
+ start_time = time.time()
2475
+ while True:
2476
+ rsp = client.DescribeSessionImageVersion(model)
2477
+ result = rsp.to_json_string()
2478
+ try:
2479
+ json_obj = json.loads(result)
2480
+ except TypeError as e:
2481
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2482
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2483
+ break
2484
+ cur_time = time.time()
2485
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2486
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2487
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2488
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2489
+ else:
2490
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2491
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2492
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2493
+
2494
+
2152
2495
  def doDescribeSubUserAccessPolicy(args, parsed_globals):
2153
2496
  g_param = parse_global_arg(parsed_globals)
2154
2497
 
@@ -2159,7 +2502,10 @@ def doDescribeSubUserAccessPolicy(args, parsed_globals):
2159
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2504
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2510
  else:
2165
2511
  cred = credential.Credential(
@@ -2211,7 +2557,10 @@ def doDescribeDLCTableList(args, parsed_globals):
2211
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2559
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2565
  else:
2217
2566
  cred = credential.Credential(
@@ -2263,7 +2612,10 @@ def doCreateSparkSessionBatchSQL(args, parsed_globals):
2263
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
2614
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
2620
  else:
2269
2621
  cred = credential.Credential(
@@ -2315,7 +2667,10 @@ def doCreateDLCTable(args, parsed_globals):
2315
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
2669
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
2675
  else:
2321
2676
  cred = credential.Credential(
@@ -2367,7 +2722,10 @@ def doGrantDLCCatalogAccess(args, parsed_globals):
2367
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
2724
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
2730
  else:
2373
2731
  cred = credential.Credential(
@@ -2419,7 +2777,10 @@ def doDescribeQuery(args, parsed_globals):
2419
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
2779
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
2785
  else:
2425
2786
  cred = credential.Credential(
@@ -2471,7 +2832,10 @@ def doDescribeDLCTable(args, parsed_globals):
2471
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
2834
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
2840
  else:
2477
2841
  cred = credential.Credential(
@@ -2523,7 +2887,10 @@ def doSuspendResumeDataEngine(args, parsed_globals):
2523
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
2889
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
2895
  else:
2529
2896
  cred = credential.Credential(
@@ -2575,7 +2942,10 @@ def doCreateDMSDatabase(args, parsed_globals):
2575
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
2944
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
2950
  else:
2581
2951
  cred = credential.Credential(
@@ -2627,7 +2997,10 @@ def doAttachUserPolicy(args, parsed_globals):
2627
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
2999
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
3005
  else:
2633
3006
  cred = credential.Credential(
@@ -2679,7 +3052,10 @@ def doCopyDLCTable(args, parsed_globals):
2679
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
3054
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
3060
  else:
2685
3061
  cred = credential.Credential(
@@ -2731,7 +3107,10 @@ def doCreateResultDownload(args, parsed_globals):
2731
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
3109
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
3115
  else:
2737
3116
  cred = credential.Credential(
@@ -2783,7 +3162,10 @@ def doModifyAdvancedStoreLocation(args, parsed_globals):
2783
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
3164
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
3170
  else:
2789
3171
  cred = credential.Credential(
@@ -2835,7 +3217,10 @@ def doAlterDMSDatabase(args, parsed_globals):
2835
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2836
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2837
3219
  )
2838
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
3225
  else:
2841
3226
  cred = credential.Credential(
@@ -2887,7 +3272,10 @@ def doDropDMSDatabase(args, parsed_globals):
2887
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2888
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2889
3274
  )
2890
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2891
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2892
3280
  else:
2893
3281
  cred = credential.Credential(
@@ -2939,7 +3327,10 @@ def doUpdateUserDataEngineConfig(args, parsed_globals):
2939
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2940
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2941
3329
  )
2942
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2943
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2944
3335
  else:
2945
3336
  cred = credential.Credential(
@@ -2991,7 +3382,10 @@ def doModifySparkAppBatch(args, parsed_globals):
2991
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2992
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2993
3384
  )
2994
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2995
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2996
3390
  else:
2997
3391
  cred = credential.Credential(
@@ -3043,7 +3437,10 @@ def doCheckDataEngineImageCanBeUpgrade(args, parsed_globals):
3043
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3044
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3045
3439
  )
3046
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3047
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3048
3445
  else:
3049
3446
  cred = credential.Credential(
@@ -3095,7 +3492,10 @@ def doDeleteSparkApp(args, parsed_globals):
3095
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
3494
  )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
3500
  else:
3101
3501
  cred = credential.Credential(
@@ -3147,7 +3547,10 @@ def doDescribeResultDownload(args, parsed_globals):
3147
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3148
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3149
3549
  )
3150
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3151
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3152
3555
  else:
3153
3556
  cred = credential.Credential(
@@ -3199,7 +3602,10 @@ def doQueryTaskCostDetail(args, parsed_globals):
3199
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3200
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3201
3604
  )
3202
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3203
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3204
3610
  else:
3205
3611
  cred = credential.Credential(
@@ -3251,7 +3657,10 @@ def doCreateWorkGroup(args, parsed_globals):
3251
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
3659
  )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
3665
  else:
3257
3666
  cred = credential.Credential(
@@ -3303,7 +3712,10 @@ def doCreateCHDFSBindingProduct(args, parsed_globals):
3303
3712
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3304
3713
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3305
3714
  )
3306
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3715
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3716
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3717
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3307
3719
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3308
3720
  else:
3309
3721
  cred = credential.Credential(
@@ -3355,7 +3767,10 @@ def doCheckDataEngineImageCanBeRollback(args, parsed_globals):
3355
3767
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3356
3768
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3357
3769
  )
3358
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3770
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3771
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3772
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3359
3774
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3360
3775
  else:
3361
3776
  cred = credential.Credential(
@@ -3407,7 +3822,10 @@ def doDescribeJob(args, parsed_globals):
3407
3822
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3408
3823
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3409
3824
  )
3410
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3825
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3826
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3827
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3411
3829
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3412
3830
  else:
3413
3831
  cred = credential.Credential(
@@ -3459,7 +3877,10 @@ def doCancelSparkSessionBatchSQL(args, parsed_globals):
3459
3877
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3460
3878
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3461
3879
  )
3462
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3880
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3881
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3882
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3463
3884
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3464
3885
  else:
3465
3886
  cred = credential.Credential(
@@ -3511,7 +3932,10 @@ def doCancelTask(args, parsed_globals):
3511
3932
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3512
3933
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3513
3934
  )
3514
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3935
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3936
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3937
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3515
3939
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3516
3940
  else:
3517
3941
  cred = credential.Credential(
@@ -3563,7 +3987,10 @@ def doModifySparkApp(args, parsed_globals):
3563
3987
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3564
3988
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3565
3989
  )
3566
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3990
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3991
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3992
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3567
3994
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3568
3995
  else:
3569
3996
  cred = credential.Credential(
@@ -3615,7 +4042,10 @@ def doGetOptimizerPolicy(args, parsed_globals):
3615
4042
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3616
4043
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3617
4044
  )
3618
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4045
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4046
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4047
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3619
4049
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3620
4050
  else:
3621
4051
  cred = credential.Credential(
@@ -3667,7 +4097,10 @@ def doDescribeUserInfo(args, parsed_globals):
3667
4097
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
4098
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
4099
  )
3670
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4100
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4101
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4102
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
4104
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
4105
  else:
3673
4106
  cred = credential.Credential(
@@ -3719,7 +4152,10 @@ def doUpdateDataEngine(args, parsed_globals):
3719
4152
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3720
4153
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3721
4154
  )
3722
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4155
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4156
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4157
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3723
4159
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3724
4160
  else:
3725
4161
  cred = credential.Credential(
@@ -3771,7 +4207,10 @@ def doCheckDataEngineConfigPairsValidity(args, parsed_globals):
3771
4207
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3772
4208
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3773
4209
  )
3774
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4210
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4211
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4212
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3775
4214
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3776
4215
  else:
3777
4216
  cred = credential.Credential(
@@ -3823,7 +4262,10 @@ def doDeleteDataEngine(args, parsed_globals):
3823
4262
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
4263
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
4264
  )
3826
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4265
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4266
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4267
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
4269
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
4270
  else:
3829
4271
  cred = credential.Credential(
@@ -3875,7 +4317,10 @@ def doDeleteUser(args, parsed_globals):
3875
4317
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3876
4318
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3877
4319
  )
3878
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4320
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4321
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4322
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3879
4324
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3880
4325
  else:
3881
4326
  cred = credential.Credential(
@@ -3927,7 +4372,10 @@ def doDescribeEngineUsageInfo(args, parsed_globals):
3927
4372
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3928
4373
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3929
4374
  )
3930
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4375
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4376
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4377
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3931
4379
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3932
4380
  else:
3933
4381
  cred = credential.Credential(
@@ -3979,7 +4427,10 @@ def doUpdateDataEngineConfig(args, parsed_globals):
3979
4427
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3980
4428
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3981
4429
  )
3982
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4430
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4431
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4432
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4433
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3983
4434
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3984
4435
  else:
3985
4436
  cred = credential.Credential(
@@ -4031,7 +4482,10 @@ def doUpdateRowFilter(args, parsed_globals):
4031
4482
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4032
4483
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4033
4484
  )
4034
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4485
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4486
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4487
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4488
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4035
4489
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4036
4490
  else:
4037
4491
  cred = credential.Credential(
@@ -4083,7 +4537,10 @@ def doUpgradeDataEngineImage(args, parsed_globals):
4083
4537
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4084
4538
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4085
4539
  )
4086
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4540
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4541
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4542
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4543
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4087
4544
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4088
4545
  else:
4089
4546
  cred = credential.Credential(
@@ -4135,7 +4592,10 @@ def doDetachUserPolicy(args, parsed_globals):
4135
4592
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4136
4593
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4137
4594
  )
4138
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4595
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4596
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4597
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4598
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4139
4599
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4140
4600
  else:
4141
4601
  cred = credential.Credential(
@@ -4187,7 +4647,10 @@ def doDetachWorkGroupPolicy(args, parsed_globals):
4187
4647
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4188
4648
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4189
4649
  )
4190
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4650
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4651
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4652
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4653
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4191
4654
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4192
4655
  else:
4193
4656
  cred = credential.Credential(
@@ -4239,7 +4702,10 @@ def doQueryResult(args, parsed_globals):
4239
4702
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4240
4703
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4241
4704
  )
4242
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4705
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4706
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4707
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4708
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4243
4709
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4244
4710
  else:
4245
4711
  cred = credential.Credential(
@@ -4291,7 +4757,10 @@ def doModifyGovernEventRule(args, parsed_globals):
4291
4757
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4292
4758
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4293
4759
  )
4294
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4760
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4761
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4762
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4763
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4295
4764
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4296
4765
  else:
4297
4766
  cred = credential.Credential(
@@ -4343,7 +4812,10 @@ def doDescribeJobs(args, parsed_globals):
4343
4812
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4344
4813
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4345
4814
  )
4346
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4816
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4817
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4818
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4347
4819
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4348
4820
  else:
4349
4821
  cred = credential.Credential(
@@ -4395,7 +4867,10 @@ def doRegisterThirdPartyAccessUser(args, parsed_globals):
4395
4867
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4396
4868
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4397
4869
  )
4398
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4870
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4871
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4872
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4873
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4399
4874
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4400
4875
  else:
4401
4876
  cred = credential.Credential(
@@ -4447,7 +4922,10 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
4447
4922
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4448
4923
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4449
4924
  )
4450
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4925
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4926
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4927
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4928
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4451
4929
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4452
4930
  else:
4453
4931
  cred = credential.Credential(
@@ -4489,7 +4967,7 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
4489
4967
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4490
4968
 
4491
4969
 
4492
- def doDescribeSparkAppTasks(args, parsed_globals):
4970
+ def doCreateDataEngine(args, parsed_globals):
4493
4971
  g_param = parse_global_arg(parsed_globals)
4494
4972
 
4495
4973
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4499,7 +4977,10 @@ def doDescribeSparkAppTasks(args, parsed_globals):
4499
4977
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4500
4978
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4501
4979
  )
4502
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4980
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4981
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4982
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4983
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4503
4984
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4504
4985
  else:
4505
4986
  cred = credential.Credential(
@@ -4518,11 +4999,11 @@ def doDescribeSparkAppTasks(args, parsed_globals):
4518
4999
  client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
4519
5000
  client._sdkVersion += ("_CLI_" + __version__)
4520
5001
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4521
- model = models.DescribeSparkAppTasksRequest()
5002
+ model = models.CreateDataEngineRequest()
4522
5003
  model.from_json_string(json.dumps(args))
4523
5004
  start_time = time.time()
4524
5005
  while True:
4525
- rsp = client.DescribeSparkAppTasks(model)
5006
+ rsp = client.CreateDataEngine(model)
4526
5007
  result = rsp.to_json_string()
4527
5008
  try:
4528
5009
  json_obj = json.loads(result)
@@ -4551,7 +5032,10 @@ def doUnbindWorkGroupsFromUser(args, parsed_globals):
4551
5032
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4552
5033
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4553
5034
  )
4554
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5035
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5036
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5037
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5038
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4555
5039
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4556
5040
  else:
4557
5041
  cred = credential.Credential(
@@ -4603,7 +5087,10 @@ def doDescribeWorkGroups(args, parsed_globals):
4603
5087
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4604
5088
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4605
5089
  )
4606
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5090
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5091
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5092
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5093
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4607
5094
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4608
5095
  else:
4609
5096
  cred = credential.Credential(
@@ -4655,7 +5142,10 @@ def doRestartDataEngine(args, parsed_globals):
4655
5142
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4656
5143
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4657
5144
  )
4658
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5145
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5146
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5147
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5148
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4659
5149
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4660
5150
  else:
4661
5151
  cred = credential.Credential(
@@ -4697,6 +5187,61 @@ def doRestartDataEngine(args, parsed_globals):
4697
5187
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4698
5188
 
4699
5189
 
5190
+ def doAttachDataMaskPolicy(args, parsed_globals):
5191
+ g_param = parse_global_arg(parsed_globals)
5192
+
5193
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5194
+ cred = credential.CVMRoleCredential()
5195
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5196
+ cred = credential.STSAssumeRoleCredential(
5197
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5198
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5199
+ )
5200
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5201
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5202
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5203
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5204
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5205
+ else:
5206
+ cred = credential.Credential(
5207
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5208
+ )
5209
+ http_profile = HttpProfile(
5210
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5211
+ reqMethod="POST",
5212
+ endpoint=g_param[OptionsDefine.Endpoint],
5213
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5214
+ )
5215
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5216
+ if g_param[OptionsDefine.Language]:
5217
+ profile.language = g_param[OptionsDefine.Language]
5218
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5219
+ client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
5220
+ client._sdkVersion += ("_CLI_" + __version__)
5221
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5222
+ model = models.AttachDataMaskPolicyRequest()
5223
+ model.from_json_string(json.dumps(args))
5224
+ start_time = time.time()
5225
+ while True:
5226
+ rsp = client.AttachDataMaskPolicy(model)
5227
+ result = rsp.to_json_string()
5228
+ try:
5229
+ json_obj = json.loads(result)
5230
+ except TypeError as e:
5231
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5232
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5233
+ break
5234
+ cur_time = time.time()
5235
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5236
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5237
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5238
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5239
+ else:
5240
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5241
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5242
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5243
+
5244
+
4700
5245
  def doRenewDataEngine(args, parsed_globals):
4701
5246
  g_param = parse_global_arg(parsed_globals)
4702
5247
 
@@ -4707,7 +5252,10 @@ def doRenewDataEngine(args, parsed_globals):
4707
5252
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4708
5253
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4709
5254
  )
4710
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5255
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5256
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5257
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5258
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4711
5259
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4712
5260
  else:
4713
5261
  cred = credential.Credential(
@@ -4759,7 +5307,10 @@ def doDeleteThirdPartyAccessUser(args, parsed_globals):
4759
5307
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4760
5308
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4761
5309
  )
4762
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5310
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5311
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5312
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5313
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4763
5314
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4764
5315
  else:
4765
5316
  cred = credential.Credential(
@@ -4811,7 +5362,10 @@ def doDescribeDMSDatabase(args, parsed_globals):
4811
5362
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4812
5363
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4813
5364
  )
4814
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5365
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5366
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5367
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5368
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
5369
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4816
5370
  else:
4817
5371
  cred = credential.Credential(
@@ -4863,7 +5417,10 @@ def doBindWorkGroupsToUser(args, parsed_globals):
4863
5417
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4864
5418
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4865
5419
  )
4866
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5420
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5421
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5422
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5423
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4867
5424
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4868
5425
  else:
4869
5426
  cred = credential.Credential(
@@ -4915,7 +5472,10 @@ def doDescribeUserDataEngineConfig(args, parsed_globals):
4915
5472
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4916
5473
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4917
5474
  )
4918
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5475
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5476
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5477
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5478
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4919
5479
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4920
5480
  else:
4921
5481
  cred = credential.Credential(
@@ -4967,7 +5527,10 @@ def doModifyUser(args, parsed_globals):
4967
5527
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4968
5528
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4969
5529
  )
4970
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5530
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5531
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5532
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5533
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4971
5534
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4972
5535
  else:
4973
5536
  cred = credential.Credential(
@@ -5019,7 +5582,10 @@ def doModifyDataEngineDescription(args, parsed_globals):
5019
5582
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5020
5583
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5021
5584
  )
5022
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5585
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5586
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5587
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5588
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5023
5589
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5024
5590
  else:
5025
5591
  cred = credential.Credential(
@@ -5071,7 +5637,10 @@ def doDropDMSTable(args, parsed_globals):
5071
5637
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5072
5638
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5073
5639
  )
5074
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5640
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5641
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5642
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5643
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5075
5644
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5076
5645
  else:
5077
5646
  cred = credential.Credential(
@@ -5113,6 +5682,61 @@ def doDropDMSTable(args, parsed_globals):
5113
5682
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5114
5683
 
5115
5684
 
5685
+ def doCreateDataMaskStrategy(args, parsed_globals):
5686
+ g_param = parse_global_arg(parsed_globals)
5687
+
5688
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5689
+ cred = credential.CVMRoleCredential()
5690
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5691
+ cred = credential.STSAssumeRoleCredential(
5692
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5693
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5694
+ )
5695
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5696
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5697
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5698
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5699
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5700
+ else:
5701
+ cred = credential.Credential(
5702
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5703
+ )
5704
+ http_profile = HttpProfile(
5705
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5706
+ reqMethod="POST",
5707
+ endpoint=g_param[OptionsDefine.Endpoint],
5708
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5709
+ )
5710
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5711
+ if g_param[OptionsDefine.Language]:
5712
+ profile.language = g_param[OptionsDefine.Language]
5713
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5714
+ client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
5715
+ client._sdkVersion += ("_CLI_" + __version__)
5716
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5717
+ model = models.CreateDataMaskStrategyRequest()
5718
+ model.from_json_string(json.dumps(args))
5719
+ start_time = time.time()
5720
+ while True:
5721
+ rsp = client.CreateDataMaskStrategy(model)
5722
+ result = rsp.to_json_string()
5723
+ try:
5724
+ json_obj = json.loads(result)
5725
+ except TypeError as e:
5726
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5727
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5728
+ break
5729
+ cur_time = time.time()
5730
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5731
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5732
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5733
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5734
+ else:
5735
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5736
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5737
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5738
+
5739
+
5116
5740
  def doDescribeStoreLocation(args, parsed_globals):
5117
5741
  g_param = parse_global_arg(parsed_globals)
5118
5742
 
@@ -5123,7 +5747,10 @@ def doDescribeStoreLocation(args, parsed_globals):
5123
5747
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5124
5748
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5125
5749
  )
5126
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5750
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5751
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5752
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5753
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5127
5754
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5128
5755
  else:
5129
5756
  cred = credential.Credential(
@@ -5175,7 +5802,10 @@ def doDescribeSparkAppJob(args, parsed_globals):
5175
5802
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5176
5803
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5177
5804
  )
5178
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5805
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5806
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5807
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5808
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5179
5809
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5180
5810
  else:
5181
5811
  cred = credential.Credential(
@@ -5217,7 +5847,7 @@ def doDescribeSparkAppJob(args, parsed_globals):
5217
5847
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5218
5848
 
5219
5849
 
5220
- def doCreateDataEngine(args, parsed_globals):
5850
+ def doUpdateDataMaskStrategy(args, parsed_globals):
5221
5851
  g_param = parse_global_arg(parsed_globals)
5222
5852
 
5223
5853
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -5227,7 +5857,10 @@ def doCreateDataEngine(args, parsed_globals):
5227
5857
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5228
5858
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5229
5859
  )
5230
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5860
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5861
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5862
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5863
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5231
5864
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5232
5865
  else:
5233
5866
  cred = credential.Credential(
@@ -5246,11 +5879,11 @@ def doCreateDataEngine(args, parsed_globals):
5246
5879
  client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
5247
5880
  client._sdkVersion += ("_CLI_" + __version__)
5248
5881
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
5249
- model = models.CreateDataEngineRequest()
5882
+ model = models.UpdateDataMaskStrategyRequest()
5250
5883
  model.from_json_string(json.dumps(args))
5251
5884
  start_time = time.time()
5252
5885
  while True:
5253
- rsp = client.CreateDataEngine(model)
5886
+ rsp = client.UpdateDataMaskStrategy(model)
5254
5887
  result = rsp.to_json_string()
5255
5888
  try:
5256
5889
  json_obj = json.loads(result)
@@ -5279,7 +5912,10 @@ def doDescribeDataEnginePythonSparkImages(args, parsed_globals):
5279
5912
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5280
5913
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5281
5914
  )
5282
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5915
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5916
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5917
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5918
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5283
5919
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5284
5920
  else:
5285
5921
  cred = credential.Credential(
@@ -5331,7 +5967,10 @@ def doDescribeLakeFsInfo(args, parsed_globals):
5331
5967
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5332
5968
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5333
5969
  )
5334
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5970
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5971
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5972
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5973
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5335
5974
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5336
5975
  else:
5337
5976
  cred = credential.Credential(
@@ -5391,11 +6030,13 @@ ACTION_MAP = {
5391
6030
  "DescribeUserRoles": doDescribeUserRoles,
5392
6031
  "ModifyUserType": doModifyUserType,
5393
6032
  "DescribeWorkGroupInfo": doDescribeWorkGroupInfo,
6033
+ "DescribeDataMaskStrategies": doDescribeDataMaskStrategies,
5394
6034
  "DeleteWorkGroup": doDeleteWorkGroup,
5395
6035
  "DescribeDataEngine": doDescribeDataEngine,
5396
6036
  "CreateStoreLocation": doCreateStoreLocation,
5397
6037
  "SwitchDataEngine": doSwitchDataEngine,
5398
6038
  "DescribeSparkSessionBatchSqlLog": doDescribeSparkSessionBatchSqlLog,
6039
+ "DeleteDataMaskStrategy": doDeleteDataMaskStrategy,
5399
6040
  "DescribeDLCCatalogAccess": doDescribeDLCCatalogAccess,
5400
6041
  "DescribeUserType": doDescribeUserType,
5401
6042
  "DescribeTasks": doDescribeTasks,
@@ -5408,6 +6049,7 @@ ACTION_MAP = {
5408
6049
  "CheckGrantedPermission": doCheckGrantedPermission,
5409
6050
  "RevokeDLCCatalogAccess": doRevokeDLCCatalogAccess,
5410
6051
  "CreateUser": doCreateUser,
6052
+ "DescribeSparkAppTasks": doDescribeSparkAppTasks,
5411
6053
  "DescribeDataEngineImageVersions": doDescribeDataEngineImageVersions,
5412
6054
  "DescribeAdvancedStoreLocation": doDescribeAdvancedStoreLocation,
5413
6055
  "DescribeSparkAppJobs": doDescribeSparkAppJobs,
@@ -5425,6 +6067,7 @@ ACTION_MAP = {
5425
6067
  "CreateSparkApp": doCreateSparkApp,
5426
6068
  "DescribeThirdPartyAccessUser": doDescribeThirdPartyAccessUser,
5427
6069
  "RollbackDataEngineImage": doRollbackDataEngineImage,
6070
+ "DescribeSessionImageVersion": doDescribeSessionImageVersion,
5428
6071
  "DescribeSubUserAccessPolicy": doDescribeSubUserAccessPolicy,
5429
6072
  "DescribeDLCTableList": doDescribeDLCTableList,
5430
6073
  "CreateSparkSessionBatchSQL": doCreateSparkSessionBatchSQL,
@@ -5470,10 +6113,11 @@ ACTION_MAP = {
5470
6113
  "DescribeJobs": doDescribeJobs,
5471
6114
  "RegisterThirdPartyAccessUser": doRegisterThirdPartyAccessUser,
5472
6115
  "DeleteUsersFromWorkGroup": doDeleteUsersFromWorkGroup,
5473
- "DescribeSparkAppTasks": doDescribeSparkAppTasks,
6116
+ "CreateDataEngine": doCreateDataEngine,
5474
6117
  "UnbindWorkGroupsFromUser": doUnbindWorkGroupsFromUser,
5475
6118
  "DescribeWorkGroups": doDescribeWorkGroups,
5476
6119
  "RestartDataEngine": doRestartDataEngine,
6120
+ "AttachDataMaskPolicy": doAttachDataMaskPolicy,
5477
6121
  "RenewDataEngine": doRenewDataEngine,
5478
6122
  "DeleteThirdPartyAccessUser": doDeleteThirdPartyAccessUser,
5479
6123
  "DescribeDMSDatabase": doDescribeDMSDatabase,
@@ -5482,9 +6126,10 @@ ACTION_MAP = {
5482
6126
  "ModifyUser": doModifyUser,
5483
6127
  "ModifyDataEngineDescription": doModifyDataEngineDescription,
5484
6128
  "DropDMSTable": doDropDMSTable,
6129
+ "CreateDataMaskStrategy": doCreateDataMaskStrategy,
5485
6130
  "DescribeStoreLocation": doDescribeStoreLocation,
5486
6131
  "DescribeSparkAppJob": doDescribeSparkAppJob,
5487
- "CreateDataEngine": doCreateDataEngine,
6132
+ "UpdateDataMaskStrategy": doUpdateDataMaskStrategy,
5488
6133
  "DescribeDataEnginePythonSparkImages": doDescribeDataEnginePythonSparkImages,
5489
6134
  "DescribeLakeFsInfo": doDescribeLakeFsInfo,
5490
6135