tccli-intl-en 3.0.1241.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/services/__init__.py +29 -1
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +78 -28
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/bi_client.py +1244 -6
- tccli/services/bi/v20220105/api.json +5340 -107
- tccli/services/bi/v20220105/examples.json +196 -1
- tccli/services/billing/billing_client.py +210 -84
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +794 -160
- tccli/services/ccc/v20200210/api.json +1748 -217
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdb/v20170320/api.json +334 -134
- tccli/services/cdb/v20170320/examples.json +3 -3
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1033 -255
- tccli/services/ckafka/v20190819/api.json +3378 -1681
- tccli/services/ckafka/v20190819/examples.json +254 -160
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2273 -1020
- tccli/services/clb/v20180317/examples.json +184 -124
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +170 -68
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +851 -382
- tccli/services/cvm/v20170312/examples.json +173 -127
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +1887 -577
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +302 -76
- tccli/services/dnspod/v20210323/api.json +153 -0
- tccli/services/dnspod/v20210323/examples.json +16 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +2815 -146
- tccli/services/emr/v20190103/api.json +14527 -4841
- tccli/services/emr/v20190103/examples.json +404 -36
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +107 -14
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +266 -0
- tccli/services/hunyuan/v20230901/api.json +270 -0
- tccli/services/hunyuan/v20230901/examples.json +20 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
- tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/kms/v20190118/api.json +80 -3
- tccli/services/kms/v20190118/examples.json +3 -3
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +370 -148
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +600 -240
- tccli/services/lke/lke_client.py +450 -180
- tccli/services/lke/v20231130/api.json +182 -39
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +953 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +357 -90
- tccli/services/mdl/v20200326/api.json +791 -24
- tccli/services/mdl/v20200326/examples.json +40 -16
- tccli/services/mdp/mdp_client.py +734 -124
- tccli/services/mdp/v20200527/api.json +748 -23
- tccli/services/mdp/v20200527/examples.json +143 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1404 -141
- tccli/services/mongodb/v20190725/api.json +2919 -677
- tccli/services/mongodb/v20190725/examples.json +190 -22
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +660 -11
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1489 -429
- tccli/services/mps/v20190612/api.json +4750 -1077
- tccli/services/mps/v20190612/examples.json +182 -70
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +417 -82
- tccli/services/ocr/v20181119/api.json +1486 -103
- tccli/services/ocr/v20181119/examples.json +42 -4
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/privatedns/privatedns_client.py +155 -62
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +545 -218
- tccli/services/redis/v20180412/api.json +225 -113
- tccli/services/redis/v20180412/examples.json +19 -19
- tccli/services/region/region_client.py +15 -6
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +145 -58
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3855 -470
- tccli/services/sqlserver/v20180328/api.json +9725 -3356
- tccli/services/sqlserver/v20180328/examples.json +470 -10
- tccli/services/ssl/ssl_client.py +190 -76
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +1590 -540
- tccli/services/teo/v20220901/api.json +703 -71
- tccli/services/teo/v20220901/examples.json +88 -22
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +690 -276
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +255 -102
- tccli/services/trtc/v20190722/api.json +135 -31
- tccli/services/trtc/v20190722/examples.json +7 -7
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/vod_client.py +895 -358
- tccli/services/vpc/v20170312/api.json +1032 -134
- tccli/services/vpc/v20170312/examples.json +119 -23
- tccli/services/vpc/vpc_client.py +2159 -644
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +239 -201
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
tccli/services/cvm/cvm_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doCreateImage(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doCreateImage(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doRemoveChcDeployVpc(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doRemoveChcDeployVpc(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doEnterRescueMode(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doEnterRescueMode(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doDescribeInstancesStatus(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doDescribeInstancesStatus(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doModifyImageSharePermission(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doModifyImageSharePermission(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doDescribeInstancesOperationLimit(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doDescribeInstancesOperationLimit(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doDescribeImageSharePermission(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doDescribeImageSharePermission(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doDescribeInstancesAttributes(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doDescribeInstancesAttributes(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doImportImage(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doImportImage(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -485,7 +512,7 @@ def doImportImage(args, parsed_globals):
|
|
|
485
512
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
513
|
|
|
487
514
|
|
|
488
|
-
def
|
|
515
|
+
def doModifyKeyPairAttribute(args, parsed_globals):
|
|
489
516
|
g_param = parse_global_arg(parsed_globals)
|
|
490
517
|
|
|
491
518
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -495,7 +522,10 @@ def doInquiryPriceRunInstances(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,18 +537,18 @@ def doInquiryPriceRunInstances(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
544
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
545
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
546
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
547
|
+
model = models.ModifyKeyPairAttributeRequest()
|
|
518
548
|
model.from_json_string(json.dumps(args))
|
|
519
549
|
start_time = time.time()
|
|
520
550
|
while True:
|
|
521
|
-
rsp = client.
|
|
551
|
+
rsp = client.ModifyKeyPairAttribute(model)
|
|
522
552
|
result = rsp.to_json_string()
|
|
523
553
|
try:
|
|
524
554
|
json_obj = json.loads(result)
|
|
@@ -537,7 +567,7 @@ def doInquiryPriceRunInstances(args, parsed_globals):
|
|
|
537
567
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
568
|
|
|
539
569
|
|
|
540
|
-
def
|
|
570
|
+
def doInquiryPriceRenewInstances(args, parsed_globals):
|
|
541
571
|
g_param = parse_global_arg(parsed_globals)
|
|
542
572
|
|
|
543
573
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -547,7 +577,10 @@ def doConfigureChcAssistVpc(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,18 +592,18 @@ def doConfigureChcAssistVpc(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
566
599
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
600
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
601
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
602
|
+
model = models.InquiryPriceRenewInstancesRequest()
|
|
570
603
|
model.from_json_string(json.dumps(args))
|
|
571
604
|
start_time = time.time()
|
|
572
605
|
while True:
|
|
573
|
-
rsp = client.
|
|
606
|
+
rsp = client.InquiryPriceRenewInstances(model)
|
|
574
607
|
result = rsp.to_json_string()
|
|
575
608
|
try:
|
|
576
609
|
json_obj = json.loads(result)
|
|
@@ -589,7 +622,7 @@ def doConfigureChcAssistVpc(args, parsed_globals):
|
|
|
589
622
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
623
|
|
|
591
624
|
|
|
592
|
-
def
|
|
625
|
+
def doConfigureChcAssistVpc(args, parsed_globals):
|
|
593
626
|
g_param = parse_global_arg(parsed_globals)
|
|
594
627
|
|
|
595
628
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -599,7 +632,10 @@ def doModifyKeyPairAttribute(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,18 +647,18 @@ def doModifyKeyPairAttribute(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
618
654
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
655
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
656
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
657
|
+
model = models.ConfigureChcAssistVpcRequest()
|
|
622
658
|
model.from_json_string(json.dumps(args))
|
|
623
659
|
start_time = time.time()
|
|
624
660
|
while True:
|
|
625
|
-
rsp = client.
|
|
661
|
+
rsp = client.ConfigureChcAssistVpc(model)
|
|
626
662
|
result = rsp.to_json_string()
|
|
627
663
|
try:
|
|
628
664
|
json_obj = json.loads(result)
|
|
@@ -651,7 +687,10 @@ def doDeleteLaunchTemplate(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,7 +702,7 @@ def doDeleteLaunchTemplate(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +742,10 @@ def doModifyInstancesAttribute(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,7 +757,7 @@ def doModifyInstancesAttribute(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -745,6 +787,61 @@ def doModifyInstancesAttribute(args, parsed_globals):
|
|
|
745
787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
788
|
|
|
747
789
|
|
|
790
|
+
def doModifyInstancesDisasterRecoverGroup(args, parsed_globals):
|
|
791
|
+
g_param = parse_global_arg(parsed_globals)
|
|
792
|
+
|
|
793
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
794
|
+
cred = credential.CVMRoleCredential()
|
|
795
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
796
|
+
cred = credential.STSAssumeRoleCredential(
|
|
797
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
798
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
799
|
+
)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
804
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
805
|
+
else:
|
|
806
|
+
cred = credential.Credential(
|
|
807
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
808
|
+
)
|
|
809
|
+
http_profile = HttpProfile(
|
|
810
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
811
|
+
reqMethod="POST",
|
|
812
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
813
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
814
|
+
)
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
816
|
+
if g_param[OptionsDefine.Language]:
|
|
817
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
818
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
819
|
+
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
820
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
821
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
822
|
+
model = models.ModifyInstancesDisasterRecoverGroupRequest()
|
|
823
|
+
model.from_json_string(json.dumps(args))
|
|
824
|
+
start_time = time.time()
|
|
825
|
+
while True:
|
|
826
|
+
rsp = client.ModifyInstancesDisasterRecoverGroup(model)
|
|
827
|
+
result = rsp.to_json_string()
|
|
828
|
+
try:
|
|
829
|
+
json_obj = json.loads(result)
|
|
830
|
+
except TypeError as e:
|
|
831
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
832
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
833
|
+
break
|
|
834
|
+
cur_time = time.time()
|
|
835
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
836
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
837
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
838
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
839
|
+
else:
|
|
840
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
841
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
842
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
843
|
+
|
|
844
|
+
|
|
748
845
|
def doInquiryPriceResetInstancesInternetMaxBandwidth(args, parsed_globals):
|
|
749
846
|
g_param = parse_global_arg(parsed_globals)
|
|
750
847
|
|
|
@@ -755,7 +852,10 @@ def doInquiryPriceResetInstancesInternetMaxBandwidth(args, parsed_globals):
|
|
|
755
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
854
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
860
|
else:
|
|
761
861
|
cred = credential.Credential(
|
|
@@ -767,7 +867,7 @@ def doInquiryPriceResetInstancesInternetMaxBandwidth(args, parsed_globals):
|
|
|
767
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
869
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
871
|
if g_param[OptionsDefine.Language]:
|
|
772
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +907,10 @@ def doDeleteImages(args, parsed_globals):
|
|
|
807
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
909
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
915
|
else:
|
|
813
916
|
cred = credential.Credential(
|
|
@@ -819,7 +922,7 @@ def doDeleteImages(args, parsed_globals):
|
|
|
819
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
924
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
926
|
if g_param[OptionsDefine.Language]:
|
|
824
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +962,10 @@ def doCreateKeyPair(args, parsed_globals):
|
|
|
859
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
964
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
970
|
else:
|
|
865
971
|
cred = credential.Credential(
|
|
@@ -871,7 +977,7 @@ def doCreateKeyPair(args, parsed_globals):
|
|
|
871
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
979
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
981
|
if g_param[OptionsDefine.Language]:
|
|
876
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +1017,10 @@ def doDescribeInstanceFamilyConfigs(args, parsed_globals):
|
|
|
911
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1019
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1025
|
else:
|
|
917
1026
|
cred = credential.Credential(
|
|
@@ -923,7 +1032,7 @@ def doDescribeInstanceFamilyConfigs(args, parsed_globals):
|
|
|
923
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
1034
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
1036
|
if g_param[OptionsDefine.Language]:
|
|
928
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1072,10 @@ def doDeleteKeyPairs(args, parsed_globals):
|
|
|
963
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1074
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1080
|
else:
|
|
969
1081
|
cred = credential.Credential(
|
|
@@ -975,7 +1087,7 @@ def doDeleteKeyPairs(args, parsed_globals):
|
|
|
975
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1089
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1091
|
if g_param[OptionsDefine.Language]:
|
|
980
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1127,10 @@ def doDescribeInternetChargeTypeConfigs(args, parsed_globals):
|
|
|
1015
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1129
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1135
|
else:
|
|
1021
1136
|
cred = credential.Credential(
|
|
@@ -1027,7 +1142,7 @@ def doDescribeInternetChargeTypeConfigs(args, parsed_globals):
|
|
|
1027
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1144
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1146
|
if g_param[OptionsDefine.Language]:
|
|
1032
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1182,10 @@ def doCreateDisasterRecoverGroup(args, parsed_globals):
|
|
|
1067
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1184
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1190
|
else:
|
|
1073
1191
|
cred = credential.Credential(
|
|
@@ -1079,7 +1197,7 @@ def doCreateDisasterRecoverGroup(args, parsed_globals):
|
|
|
1079
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1199
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1201
|
if g_param[OptionsDefine.Language]:
|
|
1084
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1109,6 +1227,61 @@ def doCreateDisasterRecoverGroup(args, parsed_globals):
|
|
|
1109
1227
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1228
|
|
|
1111
1229
|
|
|
1230
|
+
def doInquiryPriceRunInstances(args, parsed_globals):
|
|
1231
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1232
|
+
|
|
1233
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1234
|
+
cred = credential.CVMRoleCredential()
|
|
1235
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1236
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1237
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1238
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1239
|
+
)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1244
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1245
|
+
else:
|
|
1246
|
+
cred = credential.Credential(
|
|
1247
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1248
|
+
)
|
|
1249
|
+
http_profile = HttpProfile(
|
|
1250
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1251
|
+
reqMethod="POST",
|
|
1252
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1253
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1254
|
+
)
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1256
|
+
if g_param[OptionsDefine.Language]:
|
|
1257
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1258
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1259
|
+
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1260
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1261
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1262
|
+
model = models.InquiryPriceRunInstancesRequest()
|
|
1263
|
+
model.from_json_string(json.dumps(args))
|
|
1264
|
+
start_time = time.time()
|
|
1265
|
+
while True:
|
|
1266
|
+
rsp = client.InquiryPriceRunInstances(model)
|
|
1267
|
+
result = rsp.to_json_string()
|
|
1268
|
+
try:
|
|
1269
|
+
json_obj = json.loads(result)
|
|
1270
|
+
except TypeError as e:
|
|
1271
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1272
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1273
|
+
break
|
|
1274
|
+
cur_time = time.time()
|
|
1275
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1276
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1277
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1278
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1279
|
+
else:
|
|
1280
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1281
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1282
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1283
|
+
|
|
1284
|
+
|
|
1112
1285
|
def doDescribeInstances(args, parsed_globals):
|
|
1113
1286
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1287
|
|
|
@@ -1119,7 +1292,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
1119
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1294
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1300
|
else:
|
|
1125
1301
|
cred = credential.Credential(
|
|
@@ -1131,7 +1307,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
1131
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1309
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1311
|
if g_param[OptionsDefine.Language]:
|
|
1136
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1347,10 @@ def doDescribeLaunchTemplateVersions(args, parsed_globals):
|
|
|
1171
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1349
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1355
|
else:
|
|
1177
1356
|
cred = credential.Credential(
|
|
@@ -1183,7 +1362,7 @@ def doDescribeLaunchTemplateVersions(args, parsed_globals):
|
|
|
1183
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1364
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1366
|
if g_param[OptionsDefine.Language]:
|
|
1188
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1402,10 @@ def doStopInstances(args, parsed_globals):
|
|
|
1223
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1404
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1410
|
else:
|
|
1229
1411
|
cred = credential.Credential(
|
|
@@ -1235,7 +1417,7 @@ def doStopInstances(args, parsed_globals):
|
|
|
1235
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1419
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1421
|
if g_param[OptionsDefine.Language]:
|
|
1240
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1457,10 @@ def doExitRescueMode(args, parsed_globals):
|
|
|
1275
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1459
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1465
|
else:
|
|
1281
1466
|
cred = credential.Credential(
|
|
@@ -1287,7 +1472,7 @@ def doExitRescueMode(args, parsed_globals):
|
|
|
1287
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1474
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1476
|
if g_param[OptionsDefine.Language]:
|
|
1292
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1512,10 @@ def doConfigureChcDeployVpc(args, parsed_globals):
|
|
|
1327
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1514
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1520
|
else:
|
|
1333
1521
|
cred = credential.Credential(
|
|
@@ -1339,7 +1527,7 @@ def doConfigureChcDeployVpc(args, parsed_globals):
|
|
|
1339
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1529
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1531
|
if g_param[OptionsDefine.Language]:
|
|
1344
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1567,10 @@ def doAssociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1379
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1569
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1575
|
else:
|
|
1385
1576
|
cred = credential.Credential(
|
|
@@ -1391,7 +1582,7 @@ def doAssociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1391
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1584
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1586
|
if g_param[OptionsDefine.Language]:
|
|
1396
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1622,10 @@ def doRunInstances(args, parsed_globals):
|
|
|
1431
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1624
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1630
|
else:
|
|
1437
1631
|
cred = credential.Credential(
|
|
@@ -1443,7 +1637,7 @@ def doRunInstances(args, parsed_globals):
|
|
|
1443
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1639
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1641
|
if g_param[OptionsDefine.Language]:
|
|
1448
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1677,10 @@ def doModifyLaunchTemplateDefaultVersion(args, parsed_globals):
|
|
|
1483
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1679
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1685
|
else:
|
|
1489
1686
|
cred = credential.Credential(
|
|
@@ -1495,7 +1692,7 @@ def doModifyLaunchTemplateDefaultVersion(args, parsed_globals):
|
|
|
1495
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1694
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1696
|
if g_param[OptionsDefine.Language]:
|
|
1500
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1732,10 @@ def doDisassociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1535
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1734
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1740
|
else:
|
|
1541
1741
|
cred = credential.Credential(
|
|
@@ -1547,7 +1747,7 @@ def doDisassociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1547
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1749
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1751
|
if g_param[OptionsDefine.Language]:
|
|
1552
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1787,10 @@ def doInquiryPriceResizeInstanceDisks(args, parsed_globals):
|
|
|
1587
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1789
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1795
|
else:
|
|
1593
1796
|
cred = credential.Credential(
|
|
@@ -1599,7 +1802,7 @@ def doInquiryPriceResizeInstanceDisks(args, parsed_globals):
|
|
|
1599
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1804
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1806
|
if g_param[OptionsDefine.Language]:
|
|
1604
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1842,10 @@ def doModifyInstancesVpcAttribute(args, parsed_globals):
|
|
|
1639
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1844
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1850
|
else:
|
|
1645
1851
|
cred = credential.Credential(
|
|
@@ -1651,7 +1857,7 @@ def doModifyInstancesVpcAttribute(args, parsed_globals):
|
|
|
1651
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1859
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1861
|
if g_param[OptionsDefine.Language]:
|
|
1656
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1897,10 @@ def doInquiryPriceResetInstance(args, parsed_globals):
|
|
|
1691
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1899
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1905
|
else:
|
|
1697
1906
|
cred = credential.Credential(
|
|
@@ -1703,7 +1912,7 @@ def doInquiryPriceResetInstance(args, parsed_globals):
|
|
|
1703
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1914
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1916
|
if g_param[OptionsDefine.Language]:
|
|
1708
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +1952,10 @@ def doDescribeDisasterRecoverGroupQuota(args, parsed_globals):
|
|
|
1743
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1954
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1960
|
else:
|
|
1749
1961
|
cred = credential.Credential(
|
|
@@ -1755,7 +1967,7 @@ def doDescribeDisasterRecoverGroupQuota(args, parsed_globals):
|
|
|
1755
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1969
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1971
|
if g_param[OptionsDefine.Language]:
|
|
1760
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +2007,10 @@ def doResetInstancesPassword(args, parsed_globals):
|
|
|
1795
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2009
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2015
|
else:
|
|
1801
2016
|
cred = credential.Credential(
|
|
@@ -1807,7 +2022,7 @@ def doResetInstancesPassword(args, parsed_globals):
|
|
|
1807
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
2024
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
2026
|
if g_param[OptionsDefine.Language]:
|
|
1812
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +2062,10 @@ def doModifyInstancesRenewFlag(args, parsed_globals):
|
|
|
1847
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2064
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2070
|
else:
|
|
1853
2071
|
cred = credential.Credential(
|
|
@@ -1859,7 +2077,7 @@ def doModifyInstancesRenewFlag(args, parsed_globals):
|
|
|
1859
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2079
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2081
|
if g_param[OptionsDefine.Language]:
|
|
1864
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2117,10 @@ def doConvertOperatingSystems(args, parsed_globals):
|
|
|
1899
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2119
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2125
|
else:
|
|
1905
2126
|
cred = credential.Credential(
|
|
@@ -1911,7 +2132,7 @@ def doConvertOperatingSystems(args, parsed_globals):
|
|
|
1911
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2134
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2136
|
if g_param[OptionsDefine.Language]:
|
|
1916
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +2172,10 @@ def doDeleteLaunchTemplateVersions(args, parsed_globals):
|
|
|
1951
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2174
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2180
|
else:
|
|
1957
2181
|
cred = credential.Credential(
|
|
@@ -1963,7 +2187,7 @@ def doDeleteLaunchTemplateVersions(args, parsed_globals):
|
|
|
1963
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2189
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2191
|
if g_param[OptionsDefine.Language]:
|
|
1968
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2227,10 @@ def doResizeInstanceDisks(args, parsed_globals):
|
|
|
2003
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2229
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2235
|
else:
|
|
2009
2236
|
cred = credential.Credential(
|
|
@@ -2015,7 +2242,7 @@ def doResizeInstanceDisks(args, parsed_globals):
|
|
|
2015
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2244
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2246
|
if g_param[OptionsDefine.Language]:
|
|
2020
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2282,10 @@ def doCreateLaunchTemplate(args, parsed_globals):
|
|
|
2055
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2284
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2290
|
else:
|
|
2061
2291
|
cred = credential.Credential(
|
|
@@ -2067,7 +2297,7 @@ def doCreateLaunchTemplate(args, parsed_globals):
|
|
|
2067
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2299
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2301
|
if g_param[OptionsDefine.Language]:
|
|
2072
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2337,10 @@ def doDescribeReservedInstances(args, parsed_globals):
|
|
|
2107
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2339
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2345
|
else:
|
|
2113
2346
|
cred = credential.Credential(
|
|
@@ -2119,7 +2352,7 @@ def doDescribeReservedInstances(args, parsed_globals):
|
|
|
2119
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2354
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2356
|
if g_param[OptionsDefine.Language]:
|
|
2124
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2392,10 @@ def doDescribeZones(args, parsed_globals):
|
|
|
2159
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2394
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2400
|
else:
|
|
2165
2401
|
cred = credential.Credential(
|
|
@@ -2171,7 +2407,7 @@ def doDescribeZones(args, parsed_globals):
|
|
|
2171
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2409
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2411
|
if g_param[OptionsDefine.Language]:
|
|
2176
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2447,10 @@ def doDescribeImageQuota(args, parsed_globals):
|
|
|
2211
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2449
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2455
|
else:
|
|
2217
2456
|
cred = credential.Credential(
|
|
@@ -2223,7 +2462,7 @@ def doDescribeImageQuota(args, parsed_globals):
|
|
|
2223
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2464
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2466
|
if g_param[OptionsDefine.Language]:
|
|
2228
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2502,10 @@ def doDescribeChcDeniedActions(args, parsed_globals):
|
|
|
2263
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2504
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2510
|
else:
|
|
2269
2511
|
cred = credential.Credential(
|
|
@@ -2275,7 +2517,7 @@ def doDescribeChcDeniedActions(args, parsed_globals):
|
|
|
2275
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2519
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2521
|
if g_param[OptionsDefine.Language]:
|
|
2280
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2557,10 @@ def doAssociateSecurityGroups(args, parsed_globals):
|
|
|
2315
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2559
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2565
|
else:
|
|
2321
2566
|
cred = credential.Credential(
|
|
@@ -2327,7 +2572,7 @@ def doAssociateSecurityGroups(args, parsed_globals):
|
|
|
2327
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2574
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2576
|
if g_param[OptionsDefine.Language]:
|
|
2332
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2612,10 @@ def doResetInstancesType(args, parsed_globals):
|
|
|
2367
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2614
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2620
|
else:
|
|
2373
2621
|
cred = credential.Credential(
|
|
@@ -2379,7 +2627,7 @@ def doResetInstancesType(args, parsed_globals):
|
|
|
2379
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2629
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2631
|
if g_param[OptionsDefine.Language]:
|
|
2384
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2667,10 @@ def doModifyImageAttribute(args, parsed_globals):
|
|
|
2419
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2669
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2675
|
else:
|
|
2425
2676
|
cred = credential.Credential(
|
|
@@ -2431,7 +2682,7 @@ def doModifyImageAttribute(args, parsed_globals):
|
|
|
2431
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2684
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2686
|
if g_param[OptionsDefine.Language]:
|
|
2436
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2722,10 @@ def doDescribeReservedInstancesConfigInfos(args, parsed_globals):
|
|
|
2471
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2724
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2730
|
else:
|
|
2477
2731
|
cred = credential.Credential(
|
|
@@ -2483,7 +2737,7 @@ def doDescribeReservedInstancesConfigInfos(args, parsed_globals):
|
|
|
2483
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2739
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2741
|
if g_param[OptionsDefine.Language]:
|
|
2488
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2777,10 @@ def doInquiryPriceResetInstancesType(args, parsed_globals):
|
|
|
2523
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2779
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2785
|
else:
|
|
2529
2786
|
cred = credential.Credential(
|
|
@@ -2535,7 +2792,7 @@ def doInquiryPriceResetInstancesType(args, parsed_globals):
|
|
|
2535
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2794
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2796
|
if g_param[OptionsDefine.Language]:
|
|
2540
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2832,10 @@ def doModifyHostsAttribute(args, parsed_globals):
|
|
|
2575
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2834
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2840
|
else:
|
|
2581
2841
|
cred = credential.Credential(
|
|
@@ -2587,7 +2847,7 @@ def doModifyHostsAttribute(args, parsed_globals):
|
|
|
2587
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2849
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2851
|
if g_param[OptionsDefine.Language]:
|
|
2592
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2887,10 @@ def doCreateLaunchTemplateVersion(args, parsed_globals):
|
|
|
2627
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2889
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2895
|
else:
|
|
2633
2896
|
cred = credential.Credential(
|
|
@@ -2639,7 +2902,7 @@ def doCreateLaunchTemplateVersion(args, parsed_globals):
|
|
|
2639
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2904
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2906
|
if g_param[OptionsDefine.Language]:
|
|
2644
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2942,10 @@ def doDescribeRegions(args, parsed_globals):
|
|
|
2679
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2944
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2950
|
else:
|
|
2685
2951
|
cred = credential.Credential(
|
|
@@ -2691,7 +2957,7 @@ def doDescribeRegions(args, parsed_globals):
|
|
|
2691
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2959
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2961
|
if g_param[OptionsDefine.Language]:
|
|
2696
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +2997,10 @@ def doDescribeImportImageOs(args, parsed_globals):
|
|
|
2731
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2999
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3005
|
else:
|
|
2737
3006
|
cred = credential.Credential(
|
|
@@ -2743,7 +3012,7 @@ def doDescribeImportImageOs(args, parsed_globals):
|
|
|
2743
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3014
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3016
|
if g_param[OptionsDefine.Language]:
|
|
2748
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +3052,10 @@ def doInquirePricePurchaseReservedInstancesOffering(args, parsed_globals):
|
|
|
2783
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3054
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3060
|
else:
|
|
2789
3061
|
cred = credential.Credential(
|
|
@@ -2795,7 +3067,7 @@ def doInquirePricePurchaseReservedInstancesOffering(args, parsed_globals):
|
|
|
2795
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3069
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3071
|
if g_param[OptionsDefine.Language]:
|
|
2800
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2825,7 +3097,7 @@ def doInquirePricePurchaseReservedInstancesOffering(args, parsed_globals):
|
|
|
2825
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2826
3098
|
|
|
2827
3099
|
|
|
2828
|
-
def
|
|
3100
|
+
def doResetInstancesInternetMaxBandwidth(args, parsed_globals):
|
|
2829
3101
|
g_param = parse_global_arg(parsed_globals)
|
|
2830
3102
|
|
|
2831
3103
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2835,7 +3107,10 @@ def doModifyInstancesProject(args, parsed_globals):
|
|
|
2835
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3109
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3115
|
else:
|
|
2841
3116
|
cred = credential.Credential(
|
|
@@ -2847,18 +3122,18 @@ def doModifyInstancesProject(args, parsed_globals):
|
|
|
2847
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3124
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3126
|
if g_param[OptionsDefine.Language]:
|
|
2852
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2854
3129
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2855
3130
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2856
3131
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2857
|
-
model = models.
|
|
3132
|
+
model = models.ResetInstancesInternetMaxBandwidthRequest()
|
|
2858
3133
|
model.from_json_string(json.dumps(args))
|
|
2859
3134
|
start_time = time.time()
|
|
2860
3135
|
while True:
|
|
2861
|
-
rsp = client.
|
|
3136
|
+
rsp = client.ResetInstancesInternetMaxBandwidth(model)
|
|
2862
3137
|
result = rsp.to_json_string()
|
|
2863
3138
|
try:
|
|
2864
3139
|
json_obj = json.loads(result)
|
|
@@ -2887,7 +3162,10 @@ def doExportImages(args, parsed_globals):
|
|
|
2887
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3164
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3170
|
else:
|
|
2893
3171
|
cred = credential.Credential(
|
|
@@ -2899,7 +3177,7 @@ def doExportImages(args, parsed_globals):
|
|
|
2899
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3179
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3181
|
if g_param[OptionsDefine.Language]:
|
|
2904
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3217,10 @@ def doResetInstance(args, parsed_globals):
|
|
|
2939
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3219
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3225
|
else:
|
|
2945
3226
|
cred = credential.Credential(
|
|
@@ -2951,7 +3232,7 @@ def doResetInstance(args, parsed_globals):
|
|
|
2951
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3234
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3236
|
if g_param[OptionsDefine.Language]:
|
|
2956
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3272,10 @@ def doSyncImages(args, parsed_globals):
|
|
|
2991
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3274
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3280
|
else:
|
|
2997
3281
|
cred = credential.Credential(
|
|
@@ -3003,7 +3287,7 @@ def doSyncImages(args, parsed_globals):
|
|
|
3003
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3289
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3291
|
if g_param[OptionsDefine.Language]:
|
|
3008
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3327,10 @@ def doDeleteDisasterRecoverGroups(args, parsed_globals):
|
|
|
3043
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3329
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3335
|
else:
|
|
3049
3336
|
cred = credential.Credential(
|
|
@@ -3055,7 +3342,7 @@ def doDeleteDisasterRecoverGroups(args, parsed_globals):
|
|
|
3055
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3344
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3346
|
if g_param[OptionsDefine.Language]:
|
|
3060
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3382,10 @@ def doTerminateInstances(args, parsed_globals):
|
|
|
3095
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3384
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3390
|
else:
|
|
3101
3391
|
cred = credential.Credential(
|
|
@@ -3107,7 +3397,7 @@ def doTerminateInstances(args, parsed_globals):
|
|
|
3107
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3399
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3401
|
if g_param[OptionsDefine.Language]:
|
|
3112
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3437,10 @@ def doImportKeyPair(args, parsed_globals):
|
|
|
3147
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3439
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3445
|
else:
|
|
3153
3446
|
cred = credential.Credential(
|
|
@@ -3159,7 +3452,7 @@ def doImportKeyPair(args, parsed_globals):
|
|
|
3159
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3454
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3456
|
if g_param[OptionsDefine.Language]:
|
|
3164
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3492,10 @@ def doDescribeLaunchTemplates(args, parsed_globals):
|
|
|
3199
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3494
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3500
|
else:
|
|
3205
3501
|
cred = credential.Credential(
|
|
@@ -3211,7 +3507,7 @@ def doDescribeLaunchTemplates(args, parsed_globals):
|
|
|
3211
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3509
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3511
|
if g_param[OptionsDefine.Language]:
|
|
3216
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3547,10 @@ def doRemoveChcAssistVpc(args, parsed_globals):
|
|
|
3251
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3549
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3555
|
else:
|
|
3257
3556
|
cred = credential.Credential(
|
|
@@ -3263,7 +3562,7 @@ def doRemoveChcAssistVpc(args, parsed_globals):
|
|
|
3263
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3564
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3566
|
if g_param[OptionsDefine.Language]:
|
|
3268
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3602,10 @@ def doDescribeZoneInstanceConfigInfos(args, parsed_globals):
|
|
|
3303
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3604
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3610
|
else:
|
|
3309
3611
|
cred = credential.Credential(
|
|
@@ -3315,7 +3617,7 @@ def doDescribeZoneInstanceConfigInfos(args, parsed_globals):
|
|
|
3315
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3619
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3621
|
if g_param[OptionsDefine.Language]:
|
|
3320
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3345,7 +3647,7 @@ def doDescribeZoneInstanceConfigInfos(args, parsed_globals):
|
|
|
3345
3647
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3346
3648
|
|
|
3347
3649
|
|
|
3348
|
-
def
|
|
3650
|
+
def doModifyInstancesChargeType(args, parsed_globals):
|
|
3349
3651
|
g_param = parse_global_arg(parsed_globals)
|
|
3350
3652
|
|
|
3351
3653
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3355,7 +3657,10 @@ def doResetInstancesInternetMaxBandwidth(args, parsed_globals):
|
|
|
3355
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3659
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3665
|
else:
|
|
3361
3666
|
cred = credential.Credential(
|
|
@@ -3367,18 +3672,18 @@ def doResetInstancesInternetMaxBandwidth(args, parsed_globals):
|
|
|
3367
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3674
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3676
|
if g_param[OptionsDefine.Language]:
|
|
3372
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3374
3679
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3375
3680
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3376
3681
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3377
|
-
model = models.
|
|
3682
|
+
model = models.ModifyInstancesChargeTypeRequest()
|
|
3378
3683
|
model.from_json_string(json.dumps(args))
|
|
3379
3684
|
start_time = time.time()
|
|
3380
3685
|
while True:
|
|
3381
|
-
rsp = client.
|
|
3686
|
+
rsp = client.ModifyInstancesChargeType(model)
|
|
3382
3687
|
result = rsp.to_json_string()
|
|
3383
3688
|
try:
|
|
3384
3689
|
json_obj = json.loads(result)
|
|
@@ -3397,7 +3702,7 @@ def doResetInstancesInternetMaxBandwidth(args, parsed_globals):
|
|
|
3397
3702
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3398
3703
|
|
|
3399
3704
|
|
|
3400
|
-
def
|
|
3705
|
+
def doRenewInstances(args, parsed_globals):
|
|
3401
3706
|
g_param = parse_global_arg(parsed_globals)
|
|
3402
3707
|
|
|
3403
3708
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3407,7 +3712,10 @@ def doStartInstances(args, parsed_globals):
|
|
|
3407
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3714
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3720
|
else:
|
|
3413
3721
|
cred = credential.Credential(
|
|
@@ -3419,18 +3727,18 @@ def doStartInstances(args, parsed_globals):
|
|
|
3419
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3729
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3731
|
if g_param[OptionsDefine.Language]:
|
|
3424
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3426
3734
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3427
3735
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3428
3736
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3429
|
-
model = models.
|
|
3737
|
+
model = models.RenewInstancesRequest()
|
|
3430
3738
|
model.from_json_string(json.dumps(args))
|
|
3431
3739
|
start_time = time.time()
|
|
3432
3740
|
while True:
|
|
3433
|
-
rsp = client.
|
|
3741
|
+
rsp = client.RenewInstances(model)
|
|
3434
3742
|
result = rsp.to_json_string()
|
|
3435
3743
|
try:
|
|
3436
3744
|
json_obj = json.loads(result)
|
|
@@ -3459,7 +3767,10 @@ def doDescribeDisasterRecoverGroups(args, parsed_globals):
|
|
|
3459
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3769
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3775
|
else:
|
|
3465
3776
|
cred = credential.Credential(
|
|
@@ -3471,7 +3782,7 @@ def doDescribeDisasterRecoverGroups(args, parsed_globals):
|
|
|
3471
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3784
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3786
|
if g_param[OptionsDefine.Language]:
|
|
3476
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3501,6 +3812,61 @@ def doDescribeDisasterRecoverGroups(args, parsed_globals):
|
|
|
3501
3812
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3502
3813
|
|
|
3503
3814
|
|
|
3815
|
+
def doStartInstances(args, parsed_globals):
|
|
3816
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3817
|
+
|
|
3818
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3819
|
+
cred = credential.CVMRoleCredential()
|
|
3820
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3821
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3822
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3823
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3824
|
+
)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3829
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3830
|
+
else:
|
|
3831
|
+
cred = credential.Credential(
|
|
3832
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3833
|
+
)
|
|
3834
|
+
http_profile = HttpProfile(
|
|
3835
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3836
|
+
reqMethod="POST",
|
|
3837
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3838
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3839
|
+
)
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3841
|
+
if g_param[OptionsDefine.Language]:
|
|
3842
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3843
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3844
|
+
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3845
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3846
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3847
|
+
model = models.StartInstancesRequest()
|
|
3848
|
+
model.from_json_string(json.dumps(args))
|
|
3849
|
+
start_time = time.time()
|
|
3850
|
+
while True:
|
|
3851
|
+
rsp = client.StartInstances(model)
|
|
3852
|
+
result = rsp.to_json_string()
|
|
3853
|
+
try:
|
|
3854
|
+
json_obj = json.loads(result)
|
|
3855
|
+
except TypeError as e:
|
|
3856
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3857
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3858
|
+
break
|
|
3859
|
+
cur_time = time.time()
|
|
3860
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3861
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3862
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3863
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3864
|
+
else:
|
|
3865
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3866
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3867
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3868
|
+
|
|
3869
|
+
|
|
3504
3870
|
def doDescribeKeyPairs(args, parsed_globals):
|
|
3505
3871
|
g_param = parse_global_arg(parsed_globals)
|
|
3506
3872
|
|
|
@@ -3511,7 +3877,10 @@ def doDescribeKeyPairs(args, parsed_globals):
|
|
|
3511
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3879
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3885
|
else:
|
|
3517
3886
|
cred = credential.Credential(
|
|
@@ -3523,7 +3892,7 @@ def doDescribeKeyPairs(args, parsed_globals):
|
|
|
3523
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3894
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3896
|
if g_param[OptionsDefine.Language]:
|
|
3528
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +3932,10 @@ def doDescribeReservedInstancesOfferings(args, parsed_globals):
|
|
|
3563
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3934
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3940
|
else:
|
|
3569
3941
|
cred = credential.Credential(
|
|
@@ -3575,7 +3947,7 @@ def doDescribeReservedInstancesOfferings(args, parsed_globals):
|
|
|
3575
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3949
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3951
|
if g_param[OptionsDefine.Language]:
|
|
3580
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3605,7 +3977,7 @@ def doDescribeReservedInstancesOfferings(args, parsed_globals):
|
|
|
3605
3977
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3606
3978
|
|
|
3607
3979
|
|
|
3608
|
-
def
|
|
3980
|
+
def doInquiryPriceModifyInstancesChargeType(args, parsed_globals):
|
|
3609
3981
|
g_param = parse_global_arg(parsed_globals)
|
|
3610
3982
|
|
|
3611
3983
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3615,7 +3987,10 @@ def doDescribeHosts(args, parsed_globals):
|
|
|
3615
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3989
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3995
|
else:
|
|
3621
3996
|
cred = credential.Credential(
|
|
@@ -3627,18 +4002,18 @@ def doDescribeHosts(args, parsed_globals):
|
|
|
3627
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
4004
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
4006
|
if g_param[OptionsDefine.Language]:
|
|
3632
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3634
4009
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3635
4010
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3636
4011
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3637
|
-
model = models.
|
|
4012
|
+
model = models.InquiryPriceModifyInstancesChargeTypeRequest()
|
|
3638
4013
|
model.from_json_string(json.dumps(args))
|
|
3639
4014
|
start_time = time.time()
|
|
3640
4015
|
while True:
|
|
3641
|
-
rsp = client.
|
|
4016
|
+
rsp = client.InquiryPriceModifyInstancesChargeType(model)
|
|
3642
4017
|
result = rsp.to_json_string()
|
|
3643
4018
|
try:
|
|
3644
4019
|
json_obj = json.loads(result)
|
|
@@ -3667,7 +4042,10 @@ def doModifyDisasterRecoverGroupAttribute(args, parsed_globals):
|
|
|
3667
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
4044
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
4050
|
else:
|
|
3673
4051
|
cred = credential.Credential(
|
|
@@ -3679,7 +4057,7 @@ def doModifyDisasterRecoverGroupAttribute(args, parsed_globals):
|
|
|
3679
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
4059
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
4061
|
if g_param[OptionsDefine.Language]:
|
|
3684
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +4097,10 @@ def doModifyChcAttribute(args, parsed_globals):
|
|
|
3719
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4099
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4105
|
else:
|
|
3725
4106
|
cred = credential.Credential(
|
|
@@ -3731,7 +4112,7 @@ def doModifyChcAttribute(args, parsed_globals):
|
|
|
3731
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4114
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4116
|
if g_param[OptionsDefine.Language]:
|
|
3736
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +4152,10 @@ def doRebootInstances(args, parsed_globals):
|
|
|
3771
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4154
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4160
|
else:
|
|
3777
4161
|
cred = credential.Credential(
|
|
@@ -3783,7 +4167,7 @@ def doRebootInstances(args, parsed_globals):
|
|
|
3783
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4169
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4171
|
if g_param[OptionsDefine.Language]:
|
|
3788
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +4207,10 @@ def doDescribeImages(args, parsed_globals):
|
|
|
3823
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4209
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4215
|
else:
|
|
3829
4216
|
cred = credential.Credential(
|
|
@@ -3835,7 +4222,7 @@ def doDescribeImages(args, parsed_globals):
|
|
|
3835
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4224
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4226
|
if g_param[OptionsDefine.Language]:
|
|
3840
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3865,6 +4252,61 @@ def doDescribeImages(args, parsed_globals):
|
|
|
3865
4252
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3866
4253
|
|
|
3867
4254
|
|
|
4255
|
+
def doDescribeChcHosts(args, parsed_globals):
|
|
4256
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4257
|
+
|
|
4258
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4259
|
+
cred = credential.CVMRoleCredential()
|
|
4260
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4261
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4262
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4263
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4264
|
+
)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4269
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4270
|
+
else:
|
|
4271
|
+
cred = credential.Credential(
|
|
4272
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4273
|
+
)
|
|
4274
|
+
http_profile = HttpProfile(
|
|
4275
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4276
|
+
reqMethod="POST",
|
|
4277
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4278
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4279
|
+
)
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4281
|
+
if g_param[OptionsDefine.Language]:
|
|
4282
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4283
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4284
|
+
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4285
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4286
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4287
|
+
model = models.DescribeChcHostsRequest()
|
|
4288
|
+
model.from_json_string(json.dumps(args))
|
|
4289
|
+
start_time = time.time()
|
|
4290
|
+
while True:
|
|
4291
|
+
rsp = client.DescribeChcHosts(model)
|
|
4292
|
+
result = rsp.to_json_string()
|
|
4293
|
+
try:
|
|
4294
|
+
json_obj = json.loads(result)
|
|
4295
|
+
except TypeError as e:
|
|
4296
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4297
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4298
|
+
break
|
|
4299
|
+
cur_time = time.time()
|
|
4300
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4301
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4302
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4303
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4304
|
+
else:
|
|
4305
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4306
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4307
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4308
|
+
|
|
4309
|
+
|
|
3868
4310
|
def doPurchaseReservedInstancesOffering(args, parsed_globals):
|
|
3869
4311
|
g_param = parse_global_arg(parsed_globals)
|
|
3870
4312
|
|
|
@@ -3875,7 +4317,10 @@ def doPurchaseReservedInstancesOffering(args, parsed_globals):
|
|
|
3875
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4319
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4325
|
else:
|
|
3881
4326
|
cred = credential.Credential(
|
|
@@ -3887,7 +4332,7 @@ def doPurchaseReservedInstancesOffering(args, parsed_globals):
|
|
|
3887
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4334
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4336
|
if g_param[OptionsDefine.Language]:
|
|
3892
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3917,6 +4362,61 @@ def doPurchaseReservedInstancesOffering(args, parsed_globals):
|
|
|
3917
4362
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3918
4363
|
|
|
3919
4364
|
|
|
4365
|
+
def doModifyInstancesProject(args, parsed_globals):
|
|
4366
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4367
|
+
|
|
4368
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4369
|
+
cred = credential.CVMRoleCredential()
|
|
4370
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4371
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4372
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4373
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4374
|
+
)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4379
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4380
|
+
else:
|
|
4381
|
+
cred = credential.Credential(
|
|
4382
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4383
|
+
)
|
|
4384
|
+
http_profile = HttpProfile(
|
|
4385
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4386
|
+
reqMethod="POST",
|
|
4387
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4388
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4389
|
+
)
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4391
|
+
if g_param[OptionsDefine.Language]:
|
|
4392
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4393
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4394
|
+
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4395
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4396
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4397
|
+
model = models.ModifyInstancesProjectRequest()
|
|
4398
|
+
model.from_json_string(json.dumps(args))
|
|
4399
|
+
start_time = time.time()
|
|
4400
|
+
while True:
|
|
4401
|
+
rsp = client.ModifyInstancesProject(model)
|
|
4402
|
+
result = rsp.to_json_string()
|
|
4403
|
+
try:
|
|
4404
|
+
json_obj = json.loads(result)
|
|
4405
|
+
except TypeError as e:
|
|
4406
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4407
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4408
|
+
break
|
|
4409
|
+
cur_time = time.time()
|
|
4410
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4411
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4412
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4413
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4414
|
+
else:
|
|
4415
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4416
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4417
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4418
|
+
|
|
4419
|
+
|
|
3920
4420
|
def doDisassociateSecurityGroups(args, parsed_globals):
|
|
3921
4421
|
g_param = parse_global_arg(parsed_globals)
|
|
3922
4422
|
|
|
@@ -3927,7 +4427,10 @@ def doDisassociateSecurityGroups(args, parsed_globals):
|
|
|
3927
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4429
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4435
|
else:
|
|
3933
4436
|
cred = credential.Credential(
|
|
@@ -3939,7 +4442,7 @@ def doDisassociateSecurityGroups(args, parsed_globals):
|
|
|
3939
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4444
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4446
|
if g_param[OptionsDefine.Language]:
|
|
3944
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3979,7 +4482,10 @@ def doAllocateHosts(args, parsed_globals):
|
|
|
3979
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4484
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4490
|
else:
|
|
3985
4491
|
cred = credential.Credential(
|
|
@@ -3991,7 +4497,7 @@ def doAllocateHosts(args, parsed_globals):
|
|
|
3991
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4499
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4501
|
if g_param[OptionsDefine.Language]:
|
|
3996
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4031,7 +4537,10 @@ def doDescribeImageFromFamily(args, parsed_globals):
|
|
|
4031
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4539
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4545
|
else:
|
|
4037
4546
|
cred = credential.Credential(
|
|
@@ -4043,7 +4552,7 @@ def doDescribeImageFromFamily(args, parsed_globals):
|
|
|
4043
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4554
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4556
|
if g_param[OptionsDefine.Language]:
|
|
4048
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4073,7 +4582,7 @@ def doDescribeImageFromFamily(args, parsed_globals):
|
|
|
4073
4582
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4074
4583
|
|
|
4075
4584
|
|
|
4076
|
-
def
|
|
4585
|
+
def doDescribeHosts(args, parsed_globals):
|
|
4077
4586
|
g_param = parse_global_arg(parsed_globals)
|
|
4078
4587
|
|
|
4079
4588
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4083,7 +4592,10 @@ def doDescribeChcHosts(args, parsed_globals):
|
|
|
4083
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4594
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4600
|
else:
|
|
4089
4601
|
cred = credential.Credential(
|
|
@@ -4095,18 +4607,18 @@ def doDescribeChcHosts(args, parsed_globals):
|
|
|
4095
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4609
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4611
|
if g_param[OptionsDefine.Language]:
|
|
4100
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4102
4614
|
client = mod.CvmClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4103
4615
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4104
4616
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4105
|
-
model = models.
|
|
4617
|
+
model = models.DescribeHostsRequest()
|
|
4106
4618
|
model.from_json_string(json.dumps(args))
|
|
4107
4619
|
start_time = time.time()
|
|
4108
4620
|
while True:
|
|
4109
|
-
rsp = client.
|
|
4621
|
+
rsp = client.DescribeHosts(model)
|
|
4110
4622
|
result = rsp.to_json_string()
|
|
4111
4623
|
try:
|
|
4112
4624
|
json_obj = json.loads(result)
|
|
@@ -4145,11 +4657,12 @@ ACTION_MAP = {
|
|
|
4145
4657
|
"DescribeImageSharePermission": doDescribeImageSharePermission,
|
|
4146
4658
|
"DescribeInstancesAttributes": doDescribeInstancesAttributes,
|
|
4147
4659
|
"ImportImage": doImportImage,
|
|
4148
|
-
"InquiryPriceRunInstances": doInquiryPriceRunInstances,
|
|
4149
|
-
"ConfigureChcAssistVpc": doConfigureChcAssistVpc,
|
|
4150
4660
|
"ModifyKeyPairAttribute": doModifyKeyPairAttribute,
|
|
4661
|
+
"InquiryPriceRenewInstances": doInquiryPriceRenewInstances,
|
|
4662
|
+
"ConfigureChcAssistVpc": doConfigureChcAssistVpc,
|
|
4151
4663
|
"DeleteLaunchTemplate": doDeleteLaunchTemplate,
|
|
4152
4664
|
"ModifyInstancesAttribute": doModifyInstancesAttribute,
|
|
4665
|
+
"ModifyInstancesDisasterRecoverGroup": doModifyInstancesDisasterRecoverGroup,
|
|
4153
4666
|
"InquiryPriceResetInstancesInternetMaxBandwidth": doInquiryPriceResetInstancesInternetMaxBandwidth,
|
|
4154
4667
|
"DeleteImages": doDeleteImages,
|
|
4155
4668
|
"CreateKeyPair": doCreateKeyPair,
|
|
@@ -4157,6 +4670,7 @@ ACTION_MAP = {
|
|
|
4157
4670
|
"DeleteKeyPairs": doDeleteKeyPairs,
|
|
4158
4671
|
"DescribeInternetChargeTypeConfigs": doDescribeInternetChargeTypeConfigs,
|
|
4159
4672
|
"CreateDisasterRecoverGroup": doCreateDisasterRecoverGroup,
|
|
4673
|
+
"InquiryPriceRunInstances": doInquiryPriceRunInstances,
|
|
4160
4674
|
"DescribeInstances": doDescribeInstances,
|
|
4161
4675
|
"DescribeLaunchTemplateVersions": doDescribeLaunchTemplateVersions,
|
|
4162
4676
|
"StopInstances": doStopInstances,
|
|
@@ -4190,7 +4704,7 @@ ACTION_MAP = {
|
|
|
4190
4704
|
"DescribeRegions": doDescribeRegions,
|
|
4191
4705
|
"DescribeImportImageOs": doDescribeImportImageOs,
|
|
4192
4706
|
"InquirePricePurchaseReservedInstancesOffering": doInquirePricePurchaseReservedInstancesOffering,
|
|
4193
|
-
"
|
|
4707
|
+
"ResetInstancesInternetMaxBandwidth": doResetInstancesInternetMaxBandwidth,
|
|
4194
4708
|
"ExportImages": doExportImages,
|
|
4195
4709
|
"ResetInstance": doResetInstance,
|
|
4196
4710
|
"SyncImages": doSyncImages,
|
|
@@ -4200,21 +4714,24 @@ ACTION_MAP = {
|
|
|
4200
4714
|
"DescribeLaunchTemplates": doDescribeLaunchTemplates,
|
|
4201
4715
|
"RemoveChcAssistVpc": doRemoveChcAssistVpc,
|
|
4202
4716
|
"DescribeZoneInstanceConfigInfos": doDescribeZoneInstanceConfigInfos,
|
|
4203
|
-
"
|
|
4204
|
-
"
|
|
4717
|
+
"ModifyInstancesChargeType": doModifyInstancesChargeType,
|
|
4718
|
+
"RenewInstances": doRenewInstances,
|
|
4205
4719
|
"DescribeDisasterRecoverGroups": doDescribeDisasterRecoverGroups,
|
|
4720
|
+
"StartInstances": doStartInstances,
|
|
4206
4721
|
"DescribeKeyPairs": doDescribeKeyPairs,
|
|
4207
4722
|
"DescribeReservedInstancesOfferings": doDescribeReservedInstancesOfferings,
|
|
4208
|
-
"
|
|
4723
|
+
"InquiryPriceModifyInstancesChargeType": doInquiryPriceModifyInstancesChargeType,
|
|
4209
4724
|
"ModifyDisasterRecoverGroupAttribute": doModifyDisasterRecoverGroupAttribute,
|
|
4210
4725
|
"ModifyChcAttribute": doModifyChcAttribute,
|
|
4211
4726
|
"RebootInstances": doRebootInstances,
|
|
4212
4727
|
"DescribeImages": doDescribeImages,
|
|
4728
|
+
"DescribeChcHosts": doDescribeChcHosts,
|
|
4213
4729
|
"PurchaseReservedInstancesOffering": doPurchaseReservedInstancesOffering,
|
|
4730
|
+
"ModifyInstancesProject": doModifyInstancesProject,
|
|
4214
4731
|
"DisassociateSecurityGroups": doDisassociateSecurityGroups,
|
|
4215
4732
|
"AllocateHosts": doAllocateHosts,
|
|
4216
4733
|
"DescribeImageFromFamily": doDescribeImageFromFamily,
|
|
4217
|
-
"
|
|
4734
|
+
"DescribeHosts": doDescribeHosts,
|
|
4218
4735
|
|
|
4219
4736
|
}
|
|
4220
4737
|
|