tccli-intl-en 3.0.1237.1__py2.py3-none-any.whl → 3.0.1282.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +17 -1
- tccli/services/advisor/advisor_client.py +8 -2
- tccli/services/aiart/aiart_client.py +4 -1
- tccli/services/ams/ams_client.py +16 -4
- tccli/services/antiddos/antiddos_client.py +280 -70
- tccli/services/apigateway/apigateway_client.py +372 -93
- tccli/services/apm/apm_client.py +52 -13
- tccli/services/asr/asr_client.py +8 -2
- tccli/services/autoscaling/autoscaling_client.py +232 -58
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/batch_client.py +112 -28
- tccli/services/bi/bi_client.py +1242 -4
- tccli/services/bi/v20220105/api.json +5340 -107
- tccli/services/bi/v20220105/examples.json +196 -1
- tccli/services/billing/billing_client.py +168 -42
- tccli/services/cam/cam_client.py +324 -81
- tccli/services/captcha/captcha_client.py +4 -1
- tccli/services/car/car_client.py +132 -33
- tccli/services/cbs/cbs_client.py +152 -38
- tccli/services/ccc/ccc_client.py +732 -98
- tccli/services/ccc/v20200210/api.json +1727 -196
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +532 -133
- tccli/services/cdc/cdc_client.py +80 -20
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +176 -44
- tccli/services/cdwdoris/cdwdoris_client.py +308 -77
- tccli/services/cdwpg/cdwpg_client.py +96 -24
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +64 -16
- tccli/services/cfs/cfs_client.py +156 -39
- tccli/services/cfw/cfw_client.py +264 -66
- tccli/services/chdfs/chdfs_client.py +116 -29
- tccli/services/ciam/ciam_client.py +64 -16
- tccli/services/ckafka/ckafka_client.py +575 -77
- tccli/services/ckafka/v20190819/api.json +2749 -1470
- tccli/services/ckafka/v20190819/examples.json +209 -155
- tccli/services/clb/clb_client.py +332 -83
- tccli/services/clb/v20180317/api.json +29 -14
- tccli/services/cloudaudit/cloudaudit_client.py +72 -18
- tccli/services/cls/cls_client.py +348 -87
- tccli/services/cmq/cmq_client.py +12 -801
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +24 -6
- tccli/services/controlcenter/controlcenter_client.py +4 -1
- tccli/services/csip/csip_client.py +136 -34
- tccli/services/ctsdb/ctsdb_client.py +8 -2
- tccli/services/cvm/cvm_client.py +627 -110
- tccli/services/cvm/v20170312/api.json +750 -340
- tccli/services/cvm/v20170312/examples.json +105 -59
- tccli/services/cwp/cwp_client.py +1860 -465
- tccli/services/cynosdb/cynosdb_client.py +1749 -439
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +4 -1
- tccli/services/dayu/dayu_client.py +412 -103
- tccli/services/dbbrain/dbbrain_client.py +168 -42
- tccli/services/dc/dc_client.py +72 -18
- tccli/services/dcdb/dcdb_client.py +248 -62
- tccli/services/dlc/dlc_client.py +756 -111
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +8 -2
- tccli/services/dnspod/dnspod_client.py +353 -74
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +96 -24
- tccli/services/dts/dts_client.py +332 -83
- tccli/services/eb/eb_client.py +104 -26
- tccli/services/ecdn/ecdn_client.py +60 -15
- tccli/services/ecm/ecm_client.py +496 -124
- tccli/services/eiam/eiam_client.py +160 -40
- tccli/services/emr/emr_client.py +2784 -115
- tccli/services/emr/v20190103/api.json +14647 -4756
- tccli/services/emr/v20190103/examples.json +408 -40
- tccli/services/es/es_client.py +84 -21
- tccli/services/facefusion/facefusion_client.py +12 -3
- tccli/services/faceid/faceid_client.py +76 -19
- tccli/services/faceid/v20180301/api.json +79 -14
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +352 -88
- tccli/services/gme/gme_client.py +40 -10
- tccli/services/gpm/gpm_client.py +72 -18
- tccli/services/gse/gse_client.py +88 -22
- tccli/services/gwlb/gwlb_client.py +72 -18
- tccli/services/iai/iai_client.py +116 -29
- tccli/services/iap/iap_client.py +24 -6
- tccli/services/ims/ims_client.py +4 -1
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +168 -42
- tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
- tccli/services/iotcloud/iotcloud_client.py +80 -20
- tccli/services/ip/ip_client.py +24 -6
- tccli/services/kms/kms_client.py +272 -68
- tccli/services/lcic/lcic_client.py +212 -53
- tccli/services/lighthouse/lighthouse_client.py +296 -74
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +480 -120
- tccli/services/lke/lke_client.py +360 -90
- tccli/services/lke/v20231130/api.json +182 -39
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +546 -0
- tccli/services/lkeap/v20240522/api.json +855 -0
- tccli/services/lkeap/v20240522/examples.json +72 -0
- tccli/services/mariadb/mariadb_client.py +200 -50
- tccli/services/mdc/mdc_client.py +72 -18
- tccli/services/mdl/mdl_client.py +132 -33
- tccli/services/mdl/v20200326/api.json +186 -12
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/mdp_client.py +680 -70
- tccli/services/mdp/v20200527/api.json +748 -23
- tccli/services/mdp/v20200527/examples.json +143 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +340 -29
- tccli/services/mongodb/v20190725/api.json +811 -226
- tccli/services/mongodb/v20190725/examples.json +54 -22
- tccli/services/monitor/monitor_client.py +864 -152
- tccli/services/monitor/v20180724/api.json +657 -8
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +592 -92
- tccli/services/mps/v20190612/api.json +2931 -399
- tccli/services/mps/v20190612/examples.json +64 -14
- tccli/services/msp/msp_client.py +28 -7
- tccli/services/ocr/ocr_client.py +212 -45
- tccli/services/ocr/v20181119/api.json +872 -112
- tccli/services/ocr/v20181119/examples.json +12 -4
- tccli/services/omics/omics_client.py +80 -20
- tccli/services/organization/organization_client.py +464 -116
- tccli/services/postgres/postgres_client.py +364 -91
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +124 -31
- tccli/services/pts/pts_client.py +192 -48
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +4 -1
- tccli/services/redis/redis_client.py +592 -106
- tccli/services/redis/v20180412/api.json +636 -240
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/region_client.py +12 -3
- tccli/services/rum/rum_client.py +240 -60
- tccli/services/scf/scf_client.py +168 -42
- tccli/services/ses/ses_client.py +116 -29
- tccli/services/sms/sms_client.py +72 -18
- tccli/services/sqlserver/sqlserver_client.py +3772 -387
- tccli/services/sqlserver/v20180328/api.json +9760 -3380
- tccli/services/sqlserver/v20180328/examples.json +478 -18
- tccli/services/ssl/ssl_client.py +152 -38
- tccli/services/ssm/ssm_client.py +96 -24
- tccli/services/sts/sts_client.py +20 -5
- tccli/services/tag/tag_client.py +120 -30
- tccli/services/tat/tat_client.py +76 -19
- tccli/services/tbaas/tbaas_client.py +16 -4
- tccli/services/tcaplusdb/tcaplusdb_client.py +208 -52
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +4 -1
- tccli/services/tcmpp/tcmpp_client.py +416 -104
- tccli/services/tcr/tcr_client.py +304 -76
- tccli/services/tcsas/tcsas_client.py +236 -59
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1320 -330
- tccli/services/tdid/tdid_client.py +192 -48
- tccli/services/tdmq/tdmq_client.py +376 -94
- tccli/services/tem/tem_client.py +224 -56
- tccli/services/teo/teo_client.py +1127 -245
- tccli/services/teo/v20220901/api.json +382 -58
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +204 -51
- tccli/services/tke/tke_client.py +552 -138
- tccli/services/tms/tms_client.py +4 -1
- tccli/services/tmt/tmt_client.py +4 -1
- tccli/services/trabbit/trabbit_client.py +116 -29
- tccli/services/trro/trro_client.py +76 -19
- tccli/services/trtc/trtc_client.py +420 -55
- tccli/services/trtc/v20190722/api.json +685 -23
- tccli/services/trtc/v20190722/examples.json +39 -7
- tccli/services/tts/tts_client.py +4 -1
- tccli/services/vclm/vclm_client.py +8 -2
- tccli/services/vm/vm_client.py +16 -4
- tccli/services/vod/v20180717/examples.json +1 -1
- tccli/services/vod/vod_client.py +716 -179
- tccli/services/vpc/v20170312/api.json +970 -75
- tccli/services/vpc/v20170312/examples.json +106 -10
- tccli/services/vpc/vpc_client.py +1876 -361
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1051 -147
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +5830 -1026
- tccli/services/yunjing/yunjing_client.py +284 -71
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/RECORD +214 -192
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/top_level.txt +0 -0
|
@@ -27,7 +27,10 @@ def doUpdateGrafanaNotificationChannel(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -79,7 +82,10 @@ def doCreateAlertRule(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -131,7 +137,10 @@ def doDeletePrometheusClusterAgent(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -183,7 +192,10 @@ def doDescribeBindingPolicyObjectList(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -235,7 +247,10 @@ def doUpdateAlertRule(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -287,7 +302,10 @@ def doModifyPrometheusAlertPolicy(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -329,6 +347,61 @@ def doModifyPrometheusAlertPolicy(args, parsed_globals):
|
|
|
329
347
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
348
|
|
|
331
349
|
|
|
350
|
+
def doDescribePrometheusAlertGroups(args, parsed_globals):
|
|
351
|
+
g_param = parse_global_arg(parsed_globals)
|
|
352
|
+
|
|
353
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
354
|
+
cred = credential.CVMRoleCredential()
|
|
355
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
356
|
+
cred = credential.STSAssumeRoleCredential(
|
|
357
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
358
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
359
|
+
)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
364
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
365
|
+
else:
|
|
366
|
+
cred = credential.Credential(
|
|
367
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
368
|
+
)
|
|
369
|
+
http_profile = HttpProfile(
|
|
370
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
371
|
+
reqMethod="POST",
|
|
372
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
373
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
374
|
+
)
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
376
|
+
if g_param[OptionsDefine.Language]:
|
|
377
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
378
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
379
|
+
client = mod.MonitorClient(cred, g_param[OptionsDefine.Region], profile)
|
|
380
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
381
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
382
|
+
model = models.DescribePrometheusAlertGroupsRequest()
|
|
383
|
+
model.from_json_string(json.dumps(args))
|
|
384
|
+
start_time = time.time()
|
|
385
|
+
while True:
|
|
386
|
+
rsp = client.DescribePrometheusAlertGroups(model)
|
|
387
|
+
result = rsp.to_json_string()
|
|
388
|
+
try:
|
|
389
|
+
json_obj = json.loads(result)
|
|
390
|
+
except TypeError as e:
|
|
391
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
392
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
393
|
+
break
|
|
394
|
+
cur_time = time.time()
|
|
395
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
396
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
397
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
398
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
399
|
+
else:
|
|
400
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
401
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
402
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
403
|
+
|
|
404
|
+
|
|
332
405
|
def doDescribePrometheusInstanceUsage(args, parsed_globals):
|
|
333
406
|
g_param = parse_global_arg(parsed_globals)
|
|
334
407
|
|
|
@@ -339,7 +412,10 @@ def doDescribePrometheusInstanceUsage(args, parsed_globals):
|
|
|
339
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
414
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
420
|
else:
|
|
345
421
|
cred = credential.Credential(
|
|
@@ -391,7 +467,10 @@ def doModifyAlarmReceivers(args, parsed_globals):
|
|
|
391
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
469
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
475
|
else:
|
|
397
476
|
cred = credential.Credential(
|
|
@@ -443,7 +522,10 @@ def doBindingPolicyObject(args, parsed_globals):
|
|
|
443
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
524
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
530
|
else:
|
|
449
531
|
cred = credential.Credential(
|
|
@@ -485,6 +567,116 @@ def doBindingPolicyObject(args, parsed_globals):
|
|
|
485
567
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
568
|
|
|
487
569
|
|
|
570
|
+
def doDeletePrometheusAlertGroups(args, parsed_globals):
|
|
571
|
+
g_param = parse_global_arg(parsed_globals)
|
|
572
|
+
|
|
573
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
574
|
+
cred = credential.CVMRoleCredential()
|
|
575
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
576
|
+
cred = credential.STSAssumeRoleCredential(
|
|
577
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
578
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
579
|
+
)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
584
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
585
|
+
else:
|
|
586
|
+
cred = credential.Credential(
|
|
587
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
588
|
+
)
|
|
589
|
+
http_profile = HttpProfile(
|
|
590
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
591
|
+
reqMethod="POST",
|
|
592
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
593
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
594
|
+
)
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
596
|
+
if g_param[OptionsDefine.Language]:
|
|
597
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
598
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
599
|
+
client = mod.MonitorClient(cred, g_param[OptionsDefine.Region], profile)
|
|
600
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
601
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
602
|
+
model = models.DeletePrometheusAlertGroupsRequest()
|
|
603
|
+
model.from_json_string(json.dumps(args))
|
|
604
|
+
start_time = time.time()
|
|
605
|
+
while True:
|
|
606
|
+
rsp = client.DeletePrometheusAlertGroups(model)
|
|
607
|
+
result = rsp.to_json_string()
|
|
608
|
+
try:
|
|
609
|
+
json_obj = json.loads(result)
|
|
610
|
+
except TypeError as e:
|
|
611
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
612
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
613
|
+
break
|
|
614
|
+
cur_time = time.time()
|
|
615
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
616
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
617
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
618
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
619
|
+
else:
|
|
620
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
621
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
622
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
623
|
+
|
|
624
|
+
|
|
625
|
+
def doDescribePolicyGroupInfo(args, parsed_globals):
|
|
626
|
+
g_param = parse_global_arg(parsed_globals)
|
|
627
|
+
|
|
628
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
629
|
+
cred = credential.CVMRoleCredential()
|
|
630
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
631
|
+
cred = credential.STSAssumeRoleCredential(
|
|
632
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
633
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
634
|
+
)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
639
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
640
|
+
else:
|
|
641
|
+
cred = credential.Credential(
|
|
642
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
643
|
+
)
|
|
644
|
+
http_profile = HttpProfile(
|
|
645
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
646
|
+
reqMethod="POST",
|
|
647
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
648
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
649
|
+
)
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
651
|
+
if g_param[OptionsDefine.Language]:
|
|
652
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
653
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
654
|
+
client = mod.MonitorClient(cred, g_param[OptionsDefine.Region], profile)
|
|
655
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
656
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
657
|
+
model = models.DescribePolicyGroupInfoRequest()
|
|
658
|
+
model.from_json_string(json.dumps(args))
|
|
659
|
+
start_time = time.time()
|
|
660
|
+
while True:
|
|
661
|
+
rsp = client.DescribePolicyGroupInfo(model)
|
|
662
|
+
result = rsp.to_json_string()
|
|
663
|
+
try:
|
|
664
|
+
json_obj = json.loads(result)
|
|
665
|
+
except TypeError as e:
|
|
666
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
667
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
668
|
+
break
|
|
669
|
+
cur_time = time.time()
|
|
670
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
671
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
672
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
673
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
674
|
+
else:
|
|
675
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
676
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
677
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
678
|
+
|
|
679
|
+
|
|
488
680
|
def doCreateGrafanaInstance(args, parsed_globals):
|
|
489
681
|
g_param = parse_global_arg(parsed_globals)
|
|
490
682
|
|
|
@@ -495,7 +687,10 @@ def doCreateGrafanaInstance(args, parsed_globals):
|
|
|
495
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
689
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
695
|
else:
|
|
501
696
|
cred = credential.Credential(
|
|
@@ -547,7 +742,10 @@ def doDescribeBasicAlarmList(args, parsed_globals):
|
|
|
547
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
744
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
750
|
else:
|
|
553
751
|
cred = credential.Credential(
|
|
@@ -599,7 +797,10 @@ def doDescribePrometheusRecordRuleYaml(args, parsed_globals):
|
|
|
599
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
799
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
805
|
else:
|
|
605
806
|
cred = credential.Credential(
|
|
@@ -651,7 +852,10 @@ def doDescribePrometheusRecordRules(args, parsed_globals):
|
|
|
651
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
854
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
860
|
else:
|
|
657
861
|
cred = credential.Credential(
|
|
@@ -703,7 +907,10 @@ def doUpdateSSOAccount(args, parsed_globals):
|
|
|
703
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
909
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
915
|
else:
|
|
709
916
|
cred = credential.Credential(
|
|
@@ -755,7 +962,10 @@ def doDescribePrometheusClusterAgents(args, parsed_globals):
|
|
|
755
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
964
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
970
|
else:
|
|
761
971
|
cred = credential.Credential(
|
|
@@ -807,7 +1017,10 @@ def doCheckIsPrometheusNewUser(args, parsed_globals):
|
|
|
807
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
1019
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
1025
|
else:
|
|
813
1026
|
cred = credential.Credential(
|
|
@@ -859,7 +1072,10 @@ def doDescribeGrafanaEnvironments(args, parsed_globals):
|
|
|
859
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
1074
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
1080
|
else:
|
|
865
1081
|
cred = credential.Credential(
|
|
@@ -911,7 +1127,10 @@ def doUpdateRecordingRule(args, parsed_globals):
|
|
|
911
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1129
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1135
|
else:
|
|
917
1136
|
cred = credential.Credential(
|
|
@@ -963,7 +1182,10 @@ def doDeleteGrafanaNotificationChannel(args, parsed_globals):
|
|
|
963
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1184
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1190
|
else:
|
|
969
1191
|
cred = credential.Credential(
|
|
@@ -1015,7 +1237,10 @@ def doDescribeGrafanaConfig(args, parsed_globals):
|
|
|
1015
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1239
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1245
|
else:
|
|
1021
1246
|
cred = credential.Credential(
|
|
@@ -1067,7 +1292,10 @@ def doModifyAlarmPolicyInfo(args, parsed_globals):
|
|
|
1067
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1294
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1300
|
else:
|
|
1073
1301
|
cred = credential.Credential(
|
|
@@ -1119,7 +1347,10 @@ def doModifyAlarmPolicyStatus(args, parsed_globals):
|
|
|
1119
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1349
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1355
|
else:
|
|
1125
1356
|
cred = credential.Credential(
|
|
@@ -1171,7 +1402,10 @@ def doDeletePrometheusScrapeJobs(args, parsed_globals):
|
|
|
1171
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1404
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1410
|
else:
|
|
1177
1411
|
cred = credential.Credential(
|
|
@@ -1223,7 +1457,10 @@ def doEnableGrafanaSSO(args, parsed_globals):
|
|
|
1223
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1459
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1465
|
else:
|
|
1229
1466
|
cred = credential.Credential(
|
|
@@ -1275,7 +1512,10 @@ def doDeleteAlertRules(args, parsed_globals):
|
|
|
1275
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1514
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1520
|
else:
|
|
1281
1521
|
cred = credential.Credential(
|
|
@@ -1327,7 +1567,10 @@ def doDescribePolicyGroupList(args, parsed_globals):
|
|
|
1327
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1569
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1575
|
else:
|
|
1333
1576
|
cred = credential.Credential(
|
|
@@ -1379,7 +1622,10 @@ def doDescribeBaseMetrics(args, parsed_globals):
|
|
|
1379
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1624
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1630
|
else:
|
|
1385
1631
|
cred = credential.Credential(
|
|
@@ -1431,7 +1677,10 @@ def doDescribeAlarmEvents(args, parsed_globals):
|
|
|
1431
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1679
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1685
|
else:
|
|
1437
1686
|
cred = credential.Credential(
|
|
@@ -1483,7 +1732,10 @@ def doDeleteAlarmNotices(args, parsed_globals):
|
|
|
1483
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1734
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1740
|
else:
|
|
1489
1741
|
cred = credential.Credential(
|
|
@@ -1535,7 +1787,10 @@ def doModifyAlarmNotice(args, parsed_globals):
|
|
|
1535
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1789
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1795
|
else:
|
|
1541
1796
|
cred = credential.Credential(
|
|
@@ -1587,7 +1842,10 @@ def doDescribePrometheusInstanceDetail(args, parsed_globals):
|
|
|
1587
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1844
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1850
|
else:
|
|
1593
1851
|
cred = credential.Credential(
|
|
@@ -1639,7 +1897,10 @@ def doCreatePrometheusScrapeJob(args, parsed_globals):
|
|
|
1639
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1899
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1905
|
else:
|
|
1645
1906
|
cred = credential.Credential(
|
|
@@ -1691,7 +1952,10 @@ def doUnBindingPolicyObject(args, parsed_globals):
|
|
|
1691
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1954
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1960
|
else:
|
|
1697
1961
|
cred = credential.Credential(
|
|
@@ -1743,7 +2007,10 @@ def doDescribeConditionsTemplateList(args, parsed_globals):
|
|
|
1743
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2009
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2015
|
else:
|
|
1749
2016
|
cred = credential.Credential(
|
|
@@ -1795,7 +2062,10 @@ def doDescribePrometheusScrapeJobs(args, parsed_globals):
|
|
|
1795
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2064
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2070
|
else:
|
|
1801
2071
|
cred = credential.Credential(
|
|
@@ -1847,7 +2117,10 @@ def doDeleteExporterIntegration(args, parsed_globals):
|
|
|
1847
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2119
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2125
|
else:
|
|
1853
2126
|
cred = credential.Credential(
|
|
@@ -1899,7 +2172,10 @@ def doCreatePrometheusMultiTenantInstancePostPayMode(args, parsed_globals):
|
|
|
1899
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2174
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2180
|
else:
|
|
1905
2181
|
cred = credential.Credential(
|
|
@@ -1951,7 +2227,10 @@ def doUpdateGrafanaEnvironments(args, parsed_globals):
|
|
|
1951
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2229
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2235
|
else:
|
|
1957
2236
|
cred = credential.Credential(
|
|
@@ -2003,7 +2282,10 @@ def doDescribePolicyConditionList(args, parsed_globals):
|
|
|
2003
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2284
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2290
|
else:
|
|
2009
2291
|
cred = credential.Credential(
|
|
@@ -2055,7 +2337,10 @@ def doModifyAlarmPolicyCondition(args, parsed_globals):
|
|
|
2055
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2339
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2345
|
else:
|
|
2061
2346
|
cred = credential.Credential(
|
|
@@ -2107,7 +2392,10 @@ def doGetPrometheusAgentManagementCommand(args, parsed_globals):
|
|
|
2107
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2394
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2400
|
else:
|
|
2113
2401
|
cred = credential.Credential(
|
|
@@ -2159,7 +2447,10 @@ def doUpdatePrometheusScrapeJob(args, parsed_globals):
|
|
|
2159
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2449
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2455
|
else:
|
|
2165
2456
|
cred = credential.Credential(
|
|
@@ -2211,7 +2502,10 @@ def doDescribePrometheusInstanceInitStatus(args, parsed_globals):
|
|
|
2211
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2504
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2510
|
else:
|
|
2217
2511
|
cred = credential.Credential(
|
|
@@ -2263,7 +2557,10 @@ def doUpgradeGrafanaInstance(args, parsed_globals):
|
|
|
2263
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2559
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2565
|
else:
|
|
2269
2566
|
cred = credential.Credential(
|
|
@@ -2315,7 +2612,10 @@ def doDescribeGrafanaChannels(args, parsed_globals):
|
|
|
2315
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2614
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2620
|
else:
|
|
2321
2621
|
cred = credential.Credential(
|
|
@@ -2367,7 +2667,10 @@ def doDeleteGrafanaIntegration(args, parsed_globals):
|
|
|
2367
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2669
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2675
|
else:
|
|
2373
2676
|
cred = credential.Credential(
|
|
@@ -2419,7 +2722,10 @@ def doBindPrometheusManagedGrafana(args, parsed_globals):
|
|
|
2419
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2724
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2730
|
else:
|
|
2425
2731
|
cred = credential.Credential(
|
|
@@ -2471,7 +2777,10 @@ def doUnBindingAllPolicyObject(args, parsed_globals):
|
|
|
2471
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2779
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2785
|
else:
|
|
2477
2786
|
cred = credential.Credential(
|
|
@@ -2523,7 +2832,10 @@ def doDeletePolicyGroup(args, parsed_globals):
|
|
|
2523
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2834
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2840
|
else:
|
|
2529
2841
|
cred = credential.Credential(
|
|
@@ -2575,7 +2887,10 @@ def doDescribeMonitorTypes(args, parsed_globals):
|
|
|
2575
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2889
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2895
|
else:
|
|
2581
2896
|
cred = credential.Credential(
|
|
@@ -2627,7 +2942,10 @@ def doEnableSSOCamCheck(args, parsed_globals):
|
|
|
2627
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2944
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2950
|
else:
|
|
2633
2951
|
cred = credential.Credential(
|
|
@@ -2679,7 +2997,10 @@ def doInstallPlugins(args, parsed_globals):
|
|
|
2679
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2999
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3005
|
else:
|
|
2685
3006
|
cred = credential.Credential(
|
|
@@ -2731,7 +3052,10 @@ def doCreateExporterIntegration(args, parsed_globals):
|
|
|
2731
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3054
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3060
|
else:
|
|
2737
3061
|
cred = credential.Credential(
|
|
@@ -2783,7 +3107,10 @@ def doDeleteRecordingRules(args, parsed_globals):
|
|
|
2783
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3109
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3115
|
else:
|
|
2789
3116
|
cred = credential.Credential(
|
|
@@ -2835,7 +3162,10 @@ def doDescribeProductEventList(args, parsed_globals):
|
|
|
2835
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3164
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3170
|
else:
|
|
2841
3171
|
cred = credential.Credential(
|
|
@@ -2887,7 +3217,10 @@ def doDescribeAlarmHistories(args, parsed_globals):
|
|
|
2887
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3219
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3225
|
else:
|
|
2893
3226
|
cred = credential.Credential(
|
|
@@ -2939,7 +3272,10 @@ def doCreateAlarmNotice(args, parsed_globals):
|
|
|
2939
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3274
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3280
|
else:
|
|
2945
3281
|
cred = credential.Credential(
|
|
@@ -2991,7 +3327,10 @@ def doDeleteSSOAccount(args, parsed_globals):
|
|
|
2991
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3329
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3335
|
else:
|
|
2997
3336
|
cred = credential.Credential(
|
|
@@ -3043,7 +3382,10 @@ def doDescribeAlarmNotice(args, parsed_globals):
|
|
|
3043
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3384
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3390
|
else:
|
|
3049
3391
|
cred = credential.Credential(
|
|
@@ -3095,7 +3437,10 @@ def doCreateGrafanaIntegration(args, parsed_globals):
|
|
|
3095
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3439
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3445
|
else:
|
|
3101
3446
|
cred = credential.Credential(
|
|
@@ -3147,7 +3492,10 @@ def doDescribePrometheusTemp(args, parsed_globals):
|
|
|
3147
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3494
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3500
|
else:
|
|
3153
3501
|
cred = credential.Credential(
|
|
@@ -3199,7 +3547,10 @@ def doDescribePrometheusGlobalConfig(args, parsed_globals):
|
|
|
3199
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3549
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3555
|
else:
|
|
3205
3556
|
cred = credential.Credential(
|
|
@@ -3251,7 +3602,10 @@ def doSetDefaultAlarmPolicy(args, parsed_globals):
|
|
|
3251
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3604
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3610
|
else:
|
|
3257
3611
|
cred = credential.Credential(
|
|
@@ -3303,7 +3657,10 @@ def doDeleteGrafanaInstance(args, parsed_globals):
|
|
|
3303
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3659
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3665
|
else:
|
|
3309
3666
|
cred = credential.Credential(
|
|
@@ -3355,7 +3712,10 @@ def doDeletePrometheusConfig(args, parsed_globals):
|
|
|
3355
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3714
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3720
|
else:
|
|
3361
3721
|
cred = credential.Credential(
|
|
@@ -3407,7 +3767,10 @@ def doCreateSSOAccount(args, parsed_globals):
|
|
|
3407
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3769
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3775
|
else:
|
|
3413
3776
|
cred = credential.Credential(
|
|
@@ -3459,7 +3822,10 @@ def doSendCustomAlarmMsg(args, parsed_globals):
|
|
|
3459
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3824
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3830
|
else:
|
|
3465
3831
|
cred = credential.Credential(
|
|
@@ -3511,7 +3877,10 @@ def doModifyAlarmPolicyNotice(args, parsed_globals):
|
|
|
3511
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3879
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3885
|
else:
|
|
3517
3886
|
cred = credential.Credential(
|
|
@@ -3563,7 +3932,10 @@ def doEnableGrafanaInternet(args, parsed_globals):
|
|
|
3563
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3934
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3940
|
else:
|
|
3569
3941
|
cred = credential.Credential(
|
|
@@ -3615,7 +3987,10 @@ def doCreateGrafanaNotificationChannel(args, parsed_globals):
|
|
|
3615
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3989
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3995
|
else:
|
|
3621
3996
|
cred = credential.Credential(
|
|
@@ -3667,7 +4042,10 @@ def doModifyGrafanaInstance(args, parsed_globals):
|
|
|
3667
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
4044
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
4050
|
else:
|
|
3673
4051
|
cred = credential.Credential(
|
|
@@ -3719,7 +4097,10 @@ def doResumeGrafanaInstance(args, parsed_globals):
|
|
|
3719
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4099
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4105
|
else:
|
|
3725
4106
|
cred = credential.Credential(
|
|
@@ -3771,7 +4152,10 @@ def doCreatePrometheusTemp(args, parsed_globals):
|
|
|
3771
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4154
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4160
|
else:
|
|
3777
4161
|
cred = credential.Credential(
|
|
@@ -3823,7 +4207,10 @@ def doDescribeSSOAccount(args, parsed_globals):
|
|
|
3823
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4209
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4215
|
else:
|
|
3829
4216
|
cred = credential.Credential(
|
|
@@ -3875,7 +4262,10 @@ def doCreateAlarmPolicy(args, parsed_globals):
|
|
|
3875
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4264
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4270
|
else:
|
|
3881
4271
|
cred = credential.Credential(
|
|
@@ -3927,7 +4317,10 @@ def doCreatePrometheusAgent(args, parsed_globals):
|
|
|
3927
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4319
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4325
|
else:
|
|
3933
4326
|
cred = credential.Credential(
|
|
@@ -3979,7 +4372,10 @@ def doCreatePrometheusGlobalNotification(args, parsed_globals):
|
|
|
3979
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4374
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4380
|
else:
|
|
3985
4381
|
cred = credential.Credential(
|
|
@@ -4031,7 +4427,10 @@ def doUpdateAlertRuleState(args, parsed_globals):
|
|
|
4031
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4429
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4435
|
else:
|
|
4037
4436
|
cred = credential.Credential(
|
|
@@ -4083,7 +4482,10 @@ def doModifyPrometheusTemp(args, parsed_globals):
|
|
|
4083
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4484
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4490
|
else:
|
|
4089
4491
|
cred = credential.Credential(
|
|
@@ -4135,7 +4537,10 @@ def doUnbindPrometheusManagedGrafana(args, parsed_globals):
|
|
|
4135
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4539
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4545
|
else:
|
|
4141
4546
|
cred = credential.Credential(
|
|
@@ -4187,7 +4592,10 @@ def doDescribeExporterIntegrations(args, parsed_globals):
|
|
|
4187
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4594
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4600
|
else:
|
|
4193
4601
|
cred = credential.Credential(
|
|
@@ -4239,7 +4647,10 @@ def doDescribeInstalledPlugins(args, parsed_globals):
|
|
|
4239
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4649
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4655
|
else:
|
|
4245
4656
|
cred = credential.Credential(
|
|
@@ -4291,7 +4702,10 @@ def doDescribePrometheusGlobalNotification(args, parsed_globals):
|
|
|
4291
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4704
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4710
|
else:
|
|
4297
4711
|
cred = credential.Credential(
|
|
@@ -4343,7 +4757,10 @@ def doUpgradeGrafanaDashboard(args, parsed_globals):
|
|
|
4343
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4759
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4765
|
else:
|
|
4349
4766
|
cred = credential.Credential(
|
|
@@ -4395,7 +4812,10 @@ def doDescribeAlarmNotices(args, parsed_globals):
|
|
|
4395
4812
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4813
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4814
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4820
|
else:
|
|
4401
4821
|
cred = credential.Credential(
|
|
@@ -4447,7 +4867,10 @@ def doDescribeDNSConfig(args, parsed_globals):
|
|
|
4447
4867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4868
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4869
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4874
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4875
|
else:
|
|
4453
4876
|
cred = credential.Credential(
|
|
@@ -4489,7 +4912,7 @@ def doDescribeDNSConfig(args, parsed_globals):
|
|
|
4489
4912
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4490
4913
|
|
|
4491
4914
|
|
|
4492
|
-
def
|
|
4915
|
+
def doCreatePrometheusAlertGroup(args, parsed_globals):
|
|
4493
4916
|
g_param = parse_global_arg(parsed_globals)
|
|
4494
4917
|
|
|
4495
4918
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4499,7 +4922,10 @@ def doModifyPrometheusGlobalNotification(args, parsed_globals):
|
|
|
4499
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4924
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4930
|
else:
|
|
4505
4931
|
cred = credential.Credential(
|
|
@@ -4518,11 +4944,66 @@ def doModifyPrometheusGlobalNotification(args, parsed_globals):
|
|
|
4518
4944
|
client = mod.MonitorClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4519
4945
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4520
4946
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4521
|
-
model = models.
|
|
4947
|
+
model = models.CreatePrometheusAlertGroupRequest()
|
|
4522
4948
|
model.from_json_string(json.dumps(args))
|
|
4523
4949
|
start_time = time.time()
|
|
4524
4950
|
while True:
|
|
4525
|
-
rsp = client.
|
|
4951
|
+
rsp = client.CreatePrometheusAlertGroup(model)
|
|
4952
|
+
result = rsp.to_json_string()
|
|
4953
|
+
try:
|
|
4954
|
+
json_obj = json.loads(result)
|
|
4955
|
+
except TypeError as e:
|
|
4956
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4957
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4958
|
+
break
|
|
4959
|
+
cur_time = time.time()
|
|
4960
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4961
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4962
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4963
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4964
|
+
else:
|
|
4965
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4966
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4967
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4968
|
+
|
|
4969
|
+
|
|
4970
|
+
def doUpdatePrometheusAlertGroupState(args, parsed_globals):
|
|
4971
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4972
|
+
|
|
4973
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4974
|
+
cred = credential.CVMRoleCredential()
|
|
4975
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4976
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4977
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4978
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4979
|
+
)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4984
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4985
|
+
else:
|
|
4986
|
+
cred = credential.Credential(
|
|
4987
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4988
|
+
)
|
|
4989
|
+
http_profile = HttpProfile(
|
|
4990
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4991
|
+
reqMethod="POST",
|
|
4992
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4993
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4994
|
+
)
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
4996
|
+
if g_param[OptionsDefine.Language]:
|
|
4997
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4998
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4999
|
+
client = mod.MonitorClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5000
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5001
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5002
|
+
model = models.UpdatePrometheusAlertGroupStateRequest()
|
|
5003
|
+
model.from_json_string(json.dumps(args))
|
|
5004
|
+
start_time = time.time()
|
|
5005
|
+
while True:
|
|
5006
|
+
rsp = client.UpdatePrometheusAlertGroupState(model)
|
|
4526
5007
|
result = rsp.to_json_string()
|
|
4527
5008
|
try:
|
|
4528
5009
|
json_obj = json.loads(result)
|
|
@@ -4551,7 +5032,10 @@ def doDescribePrometheusAgentInstances(args, parsed_globals):
|
|
|
4551
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
5034
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
5040
|
else:
|
|
4557
5041
|
cred = credential.Credential(
|
|
@@ -4603,7 +5087,10 @@ def doDeletePrometheusRecordRuleYaml(args, parsed_globals):
|
|
|
4603
5087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
5088
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
5089
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
5094
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
5095
|
else:
|
|
4609
5096
|
cred = credential.Credential(
|
|
@@ -4655,7 +5142,10 @@ def doDescribePrometheusInstances(args, parsed_globals):
|
|
|
4655
5142
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
5143
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
5144
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
5149
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
5150
|
else:
|
|
4661
5151
|
cred = credential.Credential(
|
|
@@ -4707,7 +5197,10 @@ def doDescribeGrafanaInstances(args, parsed_globals):
|
|
|
4707
5197
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4708
5198
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4709
5199
|
)
|
|
4710
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
5204
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
5205
|
else:
|
|
4713
5206
|
cred = credential.Credential(
|
|
@@ -4759,7 +5252,10 @@ def doModifyPrometheusRecordRuleYaml(args, parsed_globals):
|
|
|
4759
5252
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
5253
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
5254
|
)
|
|
4762
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
5259
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
5260
|
else:
|
|
4765
5261
|
cred = credential.Credential(
|
|
@@ -4811,7 +5307,10 @@ def doUpdateGrafanaConfig(args, parsed_globals):
|
|
|
4811
5307
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4812
5308
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4813
5309
|
)
|
|
4814
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5310
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5311
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5312
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4815
5314
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4816
5315
|
else:
|
|
4817
5316
|
cred = credential.Credential(
|
|
@@ -4853,6 +5352,61 @@ def doUpdateGrafanaConfig(args, parsed_globals):
|
|
|
4853
5352
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4854
5353
|
|
|
4855
5354
|
|
|
5355
|
+
def doUpdatePrometheusAlertGroup(args, parsed_globals):
|
|
5356
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5357
|
+
|
|
5358
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5359
|
+
cred = credential.CVMRoleCredential()
|
|
5360
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5361
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5362
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5363
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5364
|
+
)
|
|
5365
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5366
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5367
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5369
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5370
|
+
else:
|
|
5371
|
+
cred = credential.Credential(
|
|
5372
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5373
|
+
)
|
|
5374
|
+
http_profile = HttpProfile(
|
|
5375
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5376
|
+
reqMethod="POST",
|
|
5377
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5378
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5379
|
+
)
|
|
5380
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
5381
|
+
if g_param[OptionsDefine.Language]:
|
|
5382
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5383
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5384
|
+
client = mod.MonitorClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5385
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5386
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5387
|
+
model = models.UpdatePrometheusAlertGroupRequest()
|
|
5388
|
+
model.from_json_string(json.dumps(args))
|
|
5389
|
+
start_time = time.time()
|
|
5390
|
+
while True:
|
|
5391
|
+
rsp = client.UpdatePrometheusAlertGroup(model)
|
|
5392
|
+
result = rsp.to_json_string()
|
|
5393
|
+
try:
|
|
5394
|
+
json_obj = json.loads(result)
|
|
5395
|
+
except TypeError as e:
|
|
5396
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5397
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5398
|
+
break
|
|
5399
|
+
cur_time = time.time()
|
|
5400
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5401
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5402
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5403
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5404
|
+
else:
|
|
5405
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5406
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5407
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5408
|
+
|
|
5409
|
+
|
|
4856
5410
|
def doDescribeGrafanaNotificationChannels(args, parsed_globals):
|
|
4857
5411
|
g_param = parse_global_arg(parsed_globals)
|
|
4858
5412
|
|
|
@@ -4863,7 +5417,10 @@ def doDescribeGrafanaNotificationChannels(args, parsed_globals):
|
|
|
4863
5417
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4864
5418
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4865
5419
|
)
|
|
4866
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5420
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5421
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5422
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4867
5424
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4868
5425
|
else:
|
|
4869
5426
|
cred = credential.Credential(
|
|
@@ -4915,7 +5472,10 @@ def doModifyPrometheusAgentExternalLabels(args, parsed_globals):
|
|
|
4915
5472
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4916
5473
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4917
5474
|
)
|
|
4918
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5475
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5476
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5477
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4919
5479
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4920
5480
|
else:
|
|
4921
5481
|
cred = credential.Credential(
|
|
@@ -4967,7 +5527,10 @@ def doModifyPolicyGroup(args, parsed_globals):
|
|
|
4967
5527
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4968
5528
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4969
5529
|
)
|
|
4970
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5530
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5531
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5532
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4971
5534
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4972
5535
|
else:
|
|
4973
5536
|
cred = credential.Credential(
|
|
@@ -5019,7 +5582,10 @@ def doDescribeAccidentEventList(args, parsed_globals):
|
|
|
5019
5582
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5020
5583
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5021
5584
|
)
|
|
5022
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5585
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5586
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5587
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5023
5589
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5024
5590
|
else:
|
|
5025
5591
|
cred = credential.Credential(
|
|
@@ -5071,7 +5637,10 @@ def doDescribePrometheusTempSync(args, parsed_globals):
|
|
|
5071
5637
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5072
5638
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5073
5639
|
)
|
|
5074
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5640
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5641
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5642
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5075
5644
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5076
5645
|
else:
|
|
5077
5646
|
cred = credential.Credential(
|
|
@@ -5123,7 +5692,10 @@ def doDescribePrometheusZones(args, parsed_globals):
|
|
|
5123
5692
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5124
5693
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5125
5694
|
)
|
|
5126
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5695
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5696
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5697
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5127
5699
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5128
5700
|
else:
|
|
5129
5701
|
cred = credential.Credential(
|
|
@@ -5175,7 +5747,10 @@ def doDescribeAlarmMetrics(args, parsed_globals):
|
|
|
5175
5747
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5176
5748
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5177
5749
|
)
|
|
5178
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5750
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5751
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5752
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5179
5754
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5180
5755
|
else:
|
|
5181
5756
|
cred = credential.Credential(
|
|
@@ -5227,7 +5802,10 @@ def doCreatePrometheusClusterAgent(args, parsed_globals):
|
|
|
5227
5802
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5228
5803
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5229
5804
|
)
|
|
5230
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5805
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5806
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5807
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5231
5809
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5232
5810
|
else:
|
|
5233
5811
|
cred = credential.Credential(
|
|
@@ -5279,7 +5857,10 @@ def doCreatePrometheusConfig(args, parsed_globals):
|
|
|
5279
5857
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5280
5858
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5281
5859
|
)
|
|
5282
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5860
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5861
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5862
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5283
5864
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5284
5865
|
else:
|
|
5285
5866
|
cred = credential.Credential(
|
|
@@ -5331,7 +5912,10 @@ def doUpdatePrometheusAgentStatus(args, parsed_globals):
|
|
|
5331
5912
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5332
5913
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5333
5914
|
)
|
|
5334
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5915
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5916
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5917
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5335
5919
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5336
5920
|
else:
|
|
5337
5921
|
cred = credential.Credential(
|
|
@@ -5383,7 +5967,10 @@ def doCreatePrometheusRecordRuleYaml(args, parsed_globals):
|
|
|
5383
5967
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5384
5968
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5385
5969
|
)
|
|
5386
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5970
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5971
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5972
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5387
5974
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5388
5975
|
else:
|
|
5389
5976
|
cred = credential.Credential(
|
|
@@ -5435,7 +6022,10 @@ def doCreateRecordingRule(args, parsed_globals):
|
|
|
5435
6022
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5436
6023
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5437
6024
|
)
|
|
5438
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6025
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6026
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6027
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6028
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5439
6029
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5440
6030
|
else:
|
|
5441
6031
|
cred = credential.Credential(
|
|
@@ -5487,7 +6077,10 @@ def doDescribeAlertRules(args, parsed_globals):
|
|
|
5487
6077
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5488
6078
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5489
6079
|
)
|
|
5490
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6080
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6081
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6082
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6083
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5491
6084
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5492
6085
|
else:
|
|
5493
6086
|
cred = credential.Credential(
|
|
@@ -5539,7 +6132,10 @@ def doUpdateGrafanaWhiteList(args, parsed_globals):
|
|
|
5539
6132
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5540
6133
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5541
6134
|
)
|
|
5542
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6135
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6136
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6137
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6138
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5543
6139
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5544
6140
|
else:
|
|
5545
6141
|
cred = credential.Credential(
|
|
@@ -5591,7 +6187,10 @@ def doDescribePrometheusAgents(args, parsed_globals):
|
|
|
5591
6187
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5592
6188
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5593
6189
|
)
|
|
5594
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6190
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6191
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6192
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6193
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5595
6194
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5596
6195
|
else:
|
|
5597
6196
|
cred = credential.Credential(
|
|
@@ -5643,7 +6242,10 @@ def doDescribeAlarmPolicies(args, parsed_globals):
|
|
|
5643
6242
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5644
6243
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5645
6244
|
)
|
|
5646
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6245
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6246
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6247
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6248
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5647
6249
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5648
6250
|
else:
|
|
5649
6251
|
cred = credential.Credential(
|
|
@@ -5695,7 +6297,10 @@ def doDescribePrometheusTargetsTMP(args, parsed_globals):
|
|
|
5695
6297
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5696
6298
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5697
6299
|
)
|
|
5698
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6300
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6301
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6302
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6303
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5699
6304
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5700
6305
|
else:
|
|
5701
6306
|
cred = credential.Credential(
|
|
@@ -5747,7 +6352,10 @@ def doDescribeRecordingRules(args, parsed_globals):
|
|
|
5747
6352
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5748
6353
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5749
6354
|
)
|
|
5750
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6355
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6356
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6357
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6358
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5751
6359
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5752
6360
|
else:
|
|
5753
6361
|
cred = credential.Credential(
|
|
@@ -5799,7 +6407,10 @@ def doDescribeGrafanaWhiteList(args, parsed_globals):
|
|
|
5799
6407
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5800
6408
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5801
6409
|
)
|
|
5802
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6410
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6411
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6412
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6413
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5803
6414
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5804
6415
|
else:
|
|
5805
6416
|
cred = credential.Credential(
|
|
@@ -5851,7 +6462,10 @@ def doDeleteAlarmPolicy(args, parsed_globals):
|
|
|
5851
6462
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5852
6463
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5853
6464
|
)
|
|
5854
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6465
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6466
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6467
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6468
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5855
6469
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5856
6470
|
else:
|
|
5857
6471
|
cred = credential.Credential(
|
|
@@ -5903,7 +6517,10 @@ def doCreatePrometheusAlertPolicy(args, parsed_globals):
|
|
|
5903
6517
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5904
6518
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5905
6519
|
)
|
|
5906
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6520
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6521
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6522
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6523
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5907
6524
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5908
6525
|
else:
|
|
5909
6526
|
cred = credential.Credential(
|
|
@@ -5955,7 +6572,10 @@ def doCleanGrafanaInstance(args, parsed_globals):
|
|
|
5955
6572
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5956
6573
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5957
6574
|
)
|
|
5958
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6575
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6576
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6577
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6578
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5959
6579
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5960
6580
|
else:
|
|
5961
6581
|
cred = credential.Credential(
|
|
@@ -6007,7 +6627,10 @@ def doUninstallGrafanaDashboard(args, parsed_globals):
|
|
|
6007
6627
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6008
6628
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6009
6629
|
)
|
|
6010
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6630
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6631
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6632
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6633
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6011
6634
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6012
6635
|
else:
|
|
6013
6636
|
cred = credential.Credential(
|
|
@@ -6059,7 +6682,10 @@ def doDescribePrometheusAlertPolicy(args, parsed_globals):
|
|
|
6059
6682
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6060
6683
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6061
6684
|
)
|
|
6062
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6685
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6686
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6687
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6688
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6063
6689
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6064
6690
|
else:
|
|
6065
6691
|
cred = credential.Credential(
|
|
@@ -6111,7 +6737,10 @@ def doSyncPrometheusTemp(args, parsed_globals):
|
|
|
6111
6737
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6112
6738
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6113
6739
|
)
|
|
6114
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6740
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6741
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6742
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6743
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6115
6744
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6116
6745
|
else:
|
|
6117
6746
|
cred = credential.Credential(
|
|
@@ -6163,7 +6792,10 @@ def doModifyPrometheusInstanceAttributes(args, parsed_globals):
|
|
|
6163
6792
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6164
6793
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6165
6794
|
)
|
|
6166
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6795
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6796
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6797
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6798
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6167
6799
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6168
6800
|
else:
|
|
6169
6801
|
cred = credential.Credential(
|
|
@@ -6215,7 +6847,10 @@ def doModifyAlarmPolicyTasks(args, parsed_globals):
|
|
|
6215
6847
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6216
6848
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6217
6849
|
)
|
|
6218
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6850
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6851
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6852
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6853
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6219
6854
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6220
6855
|
else:
|
|
6221
6856
|
cred = credential.Credential(
|
|
@@ -6267,7 +6902,10 @@ def doGetMonitorData(args, parsed_globals):
|
|
|
6267
6902
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6268
6903
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6269
6904
|
)
|
|
6270
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6905
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6906
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6907
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6908
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6271
6909
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6272
6910
|
else:
|
|
6273
6911
|
cred = credential.Credential(
|
|
@@ -6319,7 +6957,10 @@ def doUpdateDNSConfig(args, parsed_globals):
|
|
|
6319
6957
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6320
6958
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6321
6959
|
)
|
|
6322
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6960
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6961
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6962
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6963
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6323
6964
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6324
6965
|
else:
|
|
6325
6966
|
cred = credential.Credential(
|
|
@@ -6371,7 +7012,10 @@ def doDescribeServiceDiscovery(args, parsed_globals):
|
|
|
6371
7012
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6372
7013
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6373
7014
|
)
|
|
6374
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7015
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7016
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7017
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7018
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6375
7019
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6376
7020
|
else:
|
|
6377
7021
|
cred = credential.Credential(
|
|
@@ -6423,7 +7067,10 @@ def doRunPrometheusInstance(args, parsed_globals):
|
|
|
6423
7067
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6424
7068
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6425
7069
|
)
|
|
6426
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7070
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7071
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7072
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7073
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6427
7074
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6428
7075
|
else:
|
|
6429
7076
|
cred = credential.Credential(
|
|
@@ -6475,7 +7122,10 @@ def doDescribePrometheusConfig(args, parsed_globals):
|
|
|
6475
7122
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6476
7123
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6477
7124
|
)
|
|
6478
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7125
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7126
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7127
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7128
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6479
7129
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6480
7130
|
else:
|
|
6481
7131
|
cred = credential.Credential(
|
|
@@ -6517,7 +7167,7 @@ def doDescribePrometheusConfig(args, parsed_globals):
|
|
|
6517
7167
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6518
7168
|
|
|
6519
7169
|
|
|
6520
|
-
def
|
|
7170
|
+
def doModifyPrometheusGlobalNotification(args, parsed_globals):
|
|
6521
7171
|
g_param = parse_global_arg(parsed_globals)
|
|
6522
7172
|
|
|
6523
7173
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -6527,7 +7177,10 @@ def doDescribePolicyGroupInfo(args, parsed_globals):
|
|
|
6527
7177
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6528
7178
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6529
7179
|
)
|
|
6530
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7180
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7181
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7182
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7183
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6531
7184
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6532
7185
|
else:
|
|
6533
7186
|
cred = credential.Credential(
|
|
@@ -6546,11 +7199,11 @@ def doDescribePolicyGroupInfo(args, parsed_globals):
|
|
|
6546
7199
|
client = mod.MonitorClient(cred, g_param[OptionsDefine.Region], profile)
|
|
6547
7200
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
6548
7201
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
6549
|
-
model = models.
|
|
7202
|
+
model = models.ModifyPrometheusGlobalNotificationRequest()
|
|
6550
7203
|
model.from_json_string(json.dumps(args))
|
|
6551
7204
|
start_time = time.time()
|
|
6552
7205
|
while True:
|
|
6553
|
-
rsp = client.
|
|
7206
|
+
rsp = client.ModifyPrometheusGlobalNotification(model)
|
|
6554
7207
|
result = rsp.to_json_string()
|
|
6555
7208
|
try:
|
|
6556
7209
|
json_obj = json.loads(result)
|
|
@@ -6579,7 +7232,10 @@ def doUpdateExporterIntegration(args, parsed_globals):
|
|
|
6579
7232
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6580
7233
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6581
7234
|
)
|
|
6582
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7235
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7236
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7237
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7238
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6583
7239
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6584
7240
|
else:
|
|
6585
7241
|
cred = credential.Credential(
|
|
@@ -6631,7 +7287,10 @@ def doDescribeAllNamespaces(args, parsed_globals):
|
|
|
6631
7287
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6632
7288
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6633
7289
|
)
|
|
6634
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7290
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7291
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7292
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7293
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6635
7294
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6636
7295
|
else:
|
|
6637
7296
|
cred = credential.Credential(
|
|
@@ -6683,7 +7342,10 @@ def doCreateServiceDiscovery(args, parsed_globals):
|
|
|
6683
7342
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6684
7343
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6685
7344
|
)
|
|
6686
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7345
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7346
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7347
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7348
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6687
7349
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6688
7350
|
else:
|
|
6689
7351
|
cred = credential.Credential(
|
|
@@ -6735,7 +7397,10 @@ def doDescribeStatisticData(args, parsed_globals):
|
|
|
6735
7397
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6736
7398
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6737
7399
|
)
|
|
6738
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7400
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7401
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7402
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7403
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6739
7404
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6740
7405
|
else:
|
|
6741
7406
|
cred = credential.Credential(
|
|
@@ -6787,7 +7452,10 @@ def doDeletePrometheusTemp(args, parsed_globals):
|
|
|
6787
7452
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6788
7453
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6789
7454
|
)
|
|
6790
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7455
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7456
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7457
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7458
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6791
7459
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6792
7460
|
else:
|
|
6793
7461
|
cred = credential.Credential(
|
|
@@ -6839,7 +7507,10 @@ def doDescribeAlarmNoticeCallbacks(args, parsed_globals):
|
|
|
6839
7507
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6840
7508
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6841
7509
|
)
|
|
6842
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7510
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7511
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7512
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7513
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6843
7514
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6844
7515
|
else:
|
|
6845
7516
|
cred = credential.Credential(
|
|
@@ -6891,7 +7562,10 @@ def doDestroyPrometheusInstance(args, parsed_globals):
|
|
|
6891
7562
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6892
7563
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6893
7564
|
)
|
|
6894
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7565
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7566
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7567
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7568
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6895
7569
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6896
7570
|
else:
|
|
6897
7571
|
cred = credential.Credential(
|
|
@@ -6943,7 +7617,10 @@ def doUninstallGrafanaPlugins(args, parsed_globals):
|
|
|
6943
7617
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6944
7618
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6945
7619
|
)
|
|
6946
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7620
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7621
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7622
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7623
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6947
7624
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6948
7625
|
else:
|
|
6949
7626
|
cred = credential.Credential(
|
|
@@ -6995,7 +7672,10 @@ def doUpdateGrafanaIntegration(args, parsed_globals):
|
|
|
6995
7672
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6996
7673
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6997
7674
|
)
|
|
6998
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7675
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7676
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7677
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7678
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6999
7679
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7000
7680
|
else:
|
|
7001
7681
|
cred = credential.Credential(
|
|
@@ -7047,7 +7727,10 @@ def doCreatePolicyGroup(args, parsed_globals):
|
|
|
7047
7727
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7048
7728
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7049
7729
|
)
|
|
7050
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7730
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7731
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7732
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7733
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7051
7734
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7052
7735
|
else:
|
|
7053
7736
|
cred = credential.Credential(
|
|
@@ -7099,7 +7782,10 @@ def doTerminatePrometheusInstances(args, parsed_globals):
|
|
|
7099
7782
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7100
7783
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7101
7784
|
)
|
|
7102
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7785
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7786
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7787
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7788
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7103
7789
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7104
7790
|
else:
|
|
7105
7791
|
cred = credential.Credential(
|
|
@@ -7151,7 +7837,10 @@ def doDescribePrometheusInstancesOverview(args, parsed_globals):
|
|
|
7151
7837
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7152
7838
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7153
7839
|
)
|
|
7154
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7840
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7841
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7842
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7843
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7155
7844
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7156
7845
|
else:
|
|
7157
7846
|
cred = credential.Credential(
|
|
@@ -7203,7 +7892,10 @@ def doDeletePrometheusTempSync(args, parsed_globals):
|
|
|
7203
7892
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7204
7893
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7205
7894
|
)
|
|
7206
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7895
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7896
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7897
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7898
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7207
7899
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7208
7900
|
else:
|
|
7209
7901
|
cred = credential.Credential(
|
|
@@ -7255,7 +7947,10 @@ def doDeletePrometheusAlertPolicy(args, parsed_globals):
|
|
|
7255
7947
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7256
7948
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7257
7949
|
)
|
|
7258
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7950
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7951
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7952
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7953
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7259
7954
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7260
7955
|
else:
|
|
7261
7956
|
cred = credential.Credential(
|
|
@@ -7307,7 +8002,10 @@ def doDescribeClusterAgentCreatingProgress(args, parsed_globals):
|
|
|
7307
8002
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7308
8003
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7309
8004
|
)
|
|
7310
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8005
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8006
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8007
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8008
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7311
8009
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7312
8010
|
else:
|
|
7313
8011
|
cred = credential.Credential(
|
|
@@ -7359,7 +8057,10 @@ def doDescribeGrafanaIntegrations(args, parsed_globals):
|
|
|
7359
8057
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7360
8058
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7361
8059
|
)
|
|
7362
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8060
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8061
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8062
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8063
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7363
8064
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7364
8065
|
else:
|
|
7365
8066
|
cred = credential.Credential(
|
|
@@ -7411,7 +8112,10 @@ def doModifyPrometheusConfig(args, parsed_globals):
|
|
|
7411
8112
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7412
8113
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7413
8114
|
)
|
|
7414
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8115
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8116
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8117
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8118
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7415
8119
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7416
8120
|
else:
|
|
7417
8121
|
cred = credential.Credential(
|
|
@@ -7463,7 +8167,10 @@ def doDescribeAlarmPolicy(args, parsed_globals):
|
|
|
7463
8167
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7464
8168
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7465
8169
|
)
|
|
7466
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8170
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8171
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8172
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8173
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7467
8174
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7468
8175
|
else:
|
|
7469
8176
|
cred = credential.Credential(
|
|
@@ -7522,9 +8229,12 @@ ACTION_MAP = {
|
|
|
7522
8229
|
"DescribeBindingPolicyObjectList": doDescribeBindingPolicyObjectList,
|
|
7523
8230
|
"UpdateAlertRule": doUpdateAlertRule,
|
|
7524
8231
|
"ModifyPrometheusAlertPolicy": doModifyPrometheusAlertPolicy,
|
|
8232
|
+
"DescribePrometheusAlertGroups": doDescribePrometheusAlertGroups,
|
|
7525
8233
|
"DescribePrometheusInstanceUsage": doDescribePrometheusInstanceUsage,
|
|
7526
8234
|
"ModifyAlarmReceivers": doModifyAlarmReceivers,
|
|
7527
8235
|
"BindingPolicyObject": doBindingPolicyObject,
|
|
8236
|
+
"DeletePrometheusAlertGroups": doDeletePrometheusAlertGroups,
|
|
8237
|
+
"DescribePolicyGroupInfo": doDescribePolicyGroupInfo,
|
|
7528
8238
|
"CreateGrafanaInstance": doCreateGrafanaInstance,
|
|
7529
8239
|
"DescribeBasicAlarmList": doDescribeBasicAlarmList,
|
|
7530
8240
|
"DescribePrometheusRecordRuleYaml": doDescribePrometheusRecordRuleYaml,
|
|
@@ -7602,13 +8312,15 @@ ACTION_MAP = {
|
|
|
7602
8312
|
"UpgradeGrafanaDashboard": doUpgradeGrafanaDashboard,
|
|
7603
8313
|
"DescribeAlarmNotices": doDescribeAlarmNotices,
|
|
7604
8314
|
"DescribeDNSConfig": doDescribeDNSConfig,
|
|
7605
|
-
"
|
|
8315
|
+
"CreatePrometheusAlertGroup": doCreatePrometheusAlertGroup,
|
|
8316
|
+
"UpdatePrometheusAlertGroupState": doUpdatePrometheusAlertGroupState,
|
|
7606
8317
|
"DescribePrometheusAgentInstances": doDescribePrometheusAgentInstances,
|
|
7607
8318
|
"DeletePrometheusRecordRuleYaml": doDeletePrometheusRecordRuleYaml,
|
|
7608
8319
|
"DescribePrometheusInstances": doDescribePrometheusInstances,
|
|
7609
8320
|
"DescribeGrafanaInstances": doDescribeGrafanaInstances,
|
|
7610
8321
|
"ModifyPrometheusRecordRuleYaml": doModifyPrometheusRecordRuleYaml,
|
|
7611
8322
|
"UpdateGrafanaConfig": doUpdateGrafanaConfig,
|
|
8323
|
+
"UpdatePrometheusAlertGroup": doUpdatePrometheusAlertGroup,
|
|
7612
8324
|
"DescribeGrafanaNotificationChannels": doDescribeGrafanaNotificationChannels,
|
|
7613
8325
|
"ModifyPrometheusAgentExternalLabels": doModifyPrometheusAgentExternalLabels,
|
|
7614
8326
|
"ModifyPolicyGroup": doModifyPolicyGroup,
|
|
@@ -7641,7 +8353,7 @@ ACTION_MAP = {
|
|
|
7641
8353
|
"DescribeServiceDiscovery": doDescribeServiceDiscovery,
|
|
7642
8354
|
"RunPrometheusInstance": doRunPrometheusInstance,
|
|
7643
8355
|
"DescribePrometheusConfig": doDescribePrometheusConfig,
|
|
7644
|
-
"
|
|
8356
|
+
"ModifyPrometheusGlobalNotification": doModifyPrometheusGlobalNotification,
|
|
7645
8357
|
"UpdateExporterIntegration": doUpdateExporterIntegration,
|
|
7646
8358
|
"DescribeAllNamespaces": doDescribeAllNamespaces,
|
|
7647
8359
|
"CreateServiceDiscovery": doCreateServiceDiscovery,
|