tccli-intl-en 3.0.1241.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/services/__init__.py +29 -1
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +78 -28
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/bi_client.py +1244 -6
- tccli/services/bi/v20220105/api.json +5340 -107
- tccli/services/bi/v20220105/examples.json +196 -1
- tccli/services/billing/billing_client.py +210 -84
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +794 -160
- tccli/services/ccc/v20200210/api.json +1748 -217
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdb/v20170320/api.json +334 -134
- tccli/services/cdb/v20170320/examples.json +3 -3
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1033 -255
- tccli/services/ckafka/v20190819/api.json +3378 -1681
- tccli/services/ckafka/v20190819/examples.json +254 -160
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2273 -1020
- tccli/services/clb/v20180317/examples.json +184 -124
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +170 -68
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +851 -382
- tccli/services/cvm/v20170312/examples.json +173 -127
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +1887 -577
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +302 -76
- tccli/services/dnspod/v20210323/api.json +153 -0
- tccli/services/dnspod/v20210323/examples.json +16 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +2815 -146
- tccli/services/emr/v20190103/api.json +14527 -4841
- tccli/services/emr/v20190103/examples.json +404 -36
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +107 -14
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +266 -0
- tccli/services/hunyuan/v20230901/api.json +270 -0
- tccli/services/hunyuan/v20230901/examples.json +20 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
- tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/kms/v20190118/api.json +80 -3
- tccli/services/kms/v20190118/examples.json +3 -3
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +370 -148
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +600 -240
- tccli/services/lke/lke_client.py +450 -180
- tccli/services/lke/v20231130/api.json +182 -39
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +953 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +357 -90
- tccli/services/mdl/v20200326/api.json +791 -24
- tccli/services/mdl/v20200326/examples.json +40 -16
- tccli/services/mdp/mdp_client.py +734 -124
- tccli/services/mdp/v20200527/api.json +748 -23
- tccli/services/mdp/v20200527/examples.json +143 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1404 -141
- tccli/services/mongodb/v20190725/api.json +2919 -677
- tccli/services/mongodb/v20190725/examples.json +190 -22
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +660 -11
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1489 -429
- tccli/services/mps/v20190612/api.json +4750 -1077
- tccli/services/mps/v20190612/examples.json +182 -70
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +417 -82
- tccli/services/ocr/v20181119/api.json +1486 -103
- tccli/services/ocr/v20181119/examples.json +42 -4
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/privatedns/privatedns_client.py +155 -62
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +545 -218
- tccli/services/redis/v20180412/api.json +225 -113
- tccli/services/redis/v20180412/examples.json +19 -19
- tccli/services/region/region_client.py +15 -6
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +145 -58
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3855 -470
- tccli/services/sqlserver/v20180328/api.json +9725 -3356
- tccli/services/sqlserver/v20180328/examples.json +470 -10
- tccli/services/ssl/ssl_client.py +190 -76
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +1590 -540
- tccli/services/teo/v20220901/api.json +703 -71
- tccli/services/teo/v20220901/examples.json +88 -22
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +690 -276
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +255 -102
- tccli/services/trtc/v20190722/api.json +135 -31
- tccli/services/trtc/v20190722/examples.json +7 -7
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/vod_client.py +895 -358
- tccli/services/vpc/v20170312/api.json +1032 -134
- tccli/services/vpc/v20170312/examples.json +119 -23
- tccli/services/vpc/vpc_client.py +2159 -644
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +239 -201
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
tccli/services/dlc/dlc_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doCreateTask(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doCreateTask(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doAddUsersToWorkGroup(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doAddUsersToWorkGroup(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doDescribeTaskResult(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doDescribeTaskResult(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doDescribeForbiddenTablePro(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doDescribeForbiddenTablePro(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doDescribeUserRoles(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doDescribeUserRoles(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doModifyUserType(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doModifyUserType(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -381,6 +402,61 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
|
|
|
381
402
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
403
|
|
|
383
404
|
|
|
405
|
+
def doDescribeDataMaskStrategies(args, parsed_globals):
|
|
406
|
+
g_param = parse_global_arg(parsed_globals)
|
|
407
|
+
|
|
408
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
409
|
+
cred = credential.CVMRoleCredential()
|
|
410
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
411
|
+
cred = credential.STSAssumeRoleCredential(
|
|
412
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
413
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
414
|
+
)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
419
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
420
|
+
else:
|
|
421
|
+
cred = credential.Credential(
|
|
422
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
423
|
+
)
|
|
424
|
+
http_profile = HttpProfile(
|
|
425
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
426
|
+
reqMethod="POST",
|
|
427
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
428
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
429
|
+
)
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
431
|
+
if g_param[OptionsDefine.Language]:
|
|
432
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
433
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
434
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
435
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
436
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
437
|
+
model = models.DescribeDataMaskStrategiesRequest()
|
|
438
|
+
model.from_json_string(json.dumps(args))
|
|
439
|
+
start_time = time.time()
|
|
440
|
+
while True:
|
|
441
|
+
rsp = client.DescribeDataMaskStrategies(model)
|
|
442
|
+
result = rsp.to_json_string()
|
|
443
|
+
try:
|
|
444
|
+
json_obj = json.loads(result)
|
|
445
|
+
except TypeError as e:
|
|
446
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
447
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
448
|
+
break
|
|
449
|
+
cur_time = time.time()
|
|
450
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
451
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
452
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
453
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
454
|
+
else:
|
|
455
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
456
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
457
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
458
|
+
|
|
459
|
+
|
|
384
460
|
def doDeleteWorkGroup(args, parsed_globals):
|
|
385
461
|
g_param = parse_global_arg(parsed_globals)
|
|
386
462
|
|
|
@@ -391,7 +467,10 @@ def doDeleteWorkGroup(args, parsed_globals):
|
|
|
391
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
469
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
475
|
else:
|
|
397
476
|
cred = credential.Credential(
|
|
@@ -403,7 +482,7 @@ def doDeleteWorkGroup(args, parsed_globals):
|
|
|
403
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
484
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
486
|
if g_param[OptionsDefine.Language]:
|
|
408
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +522,10 @@ def doDescribeDataEngine(args, parsed_globals):
|
|
|
443
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
524
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
530
|
else:
|
|
449
531
|
cred = credential.Credential(
|
|
@@ -455,7 +537,7 @@ def doDescribeDataEngine(args, parsed_globals):
|
|
|
455
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
539
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
541
|
if g_param[OptionsDefine.Language]:
|
|
460
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +577,10 @@ def doCreateStoreLocation(args, parsed_globals):
|
|
|
495
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
579
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
585
|
else:
|
|
501
586
|
cred = credential.Credential(
|
|
@@ -507,7 +592,7 @@ def doCreateStoreLocation(args, parsed_globals):
|
|
|
507
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
594
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
596
|
if g_param[OptionsDefine.Language]:
|
|
512
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +632,10 @@ def doSwitchDataEngine(args, parsed_globals):
|
|
|
547
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
634
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
640
|
else:
|
|
553
641
|
cred = credential.Credential(
|
|
@@ -559,7 +647,7 @@ def doSwitchDataEngine(args, parsed_globals):
|
|
|
559
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
649
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
651
|
if g_param[OptionsDefine.Language]:
|
|
564
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +687,10 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
|
|
|
599
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
689
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
695
|
else:
|
|
605
696
|
cred = credential.Credential(
|
|
@@ -611,7 +702,7 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
|
|
|
611
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
704
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
706
|
if g_param[OptionsDefine.Language]:
|
|
616
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -641,6 +732,61 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
|
|
|
641
732
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
733
|
|
|
643
734
|
|
|
735
|
+
def doDeleteDataMaskStrategy(args, parsed_globals):
|
|
736
|
+
g_param = parse_global_arg(parsed_globals)
|
|
737
|
+
|
|
738
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
739
|
+
cred = credential.CVMRoleCredential()
|
|
740
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
741
|
+
cred = credential.STSAssumeRoleCredential(
|
|
742
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
743
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
744
|
+
)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
749
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
750
|
+
else:
|
|
751
|
+
cred = credential.Credential(
|
|
752
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
753
|
+
)
|
|
754
|
+
http_profile = HttpProfile(
|
|
755
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
756
|
+
reqMethod="POST",
|
|
757
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
758
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
759
|
+
)
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
761
|
+
if g_param[OptionsDefine.Language]:
|
|
762
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
763
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
764
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
765
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
766
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
767
|
+
model = models.DeleteDataMaskStrategyRequest()
|
|
768
|
+
model.from_json_string(json.dumps(args))
|
|
769
|
+
start_time = time.time()
|
|
770
|
+
while True:
|
|
771
|
+
rsp = client.DeleteDataMaskStrategy(model)
|
|
772
|
+
result = rsp.to_json_string()
|
|
773
|
+
try:
|
|
774
|
+
json_obj = json.loads(result)
|
|
775
|
+
except TypeError as e:
|
|
776
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
777
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
778
|
+
break
|
|
779
|
+
cur_time = time.time()
|
|
780
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
781
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
782
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
783
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
784
|
+
else:
|
|
785
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
786
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
787
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
788
|
+
|
|
789
|
+
|
|
644
790
|
def doDescribeDLCCatalogAccess(args, parsed_globals):
|
|
645
791
|
g_param = parse_global_arg(parsed_globals)
|
|
646
792
|
|
|
@@ -651,7 +797,10 @@ def doDescribeDLCCatalogAccess(args, parsed_globals):
|
|
|
651
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
799
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
805
|
else:
|
|
657
806
|
cred = credential.Credential(
|
|
@@ -663,7 +812,7 @@ def doDescribeDLCCatalogAccess(args, parsed_globals):
|
|
|
663
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
814
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
816
|
if g_param[OptionsDefine.Language]:
|
|
668
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +852,10 @@ def doDescribeUserType(args, parsed_globals):
|
|
|
703
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
854
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
860
|
else:
|
|
709
861
|
cred = credential.Credential(
|
|
@@ -715,7 +867,7 @@ def doDescribeUserType(args, parsed_globals):
|
|
|
715
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
869
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
871
|
if g_param[OptionsDefine.Language]:
|
|
720
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +907,10 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
755
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
909
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
915
|
else:
|
|
761
916
|
cred = credential.Credential(
|
|
@@ -767,7 +922,7 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
767
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
924
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
926
|
if g_param[OptionsDefine.Language]:
|
|
772
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +962,10 @@ def doDescribeTaskStatistics(args, parsed_globals):
|
|
|
807
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
964
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
970
|
else:
|
|
813
971
|
cred = credential.Credential(
|
|
@@ -819,7 +977,7 @@ def doDescribeTaskStatistics(args, parsed_globals):
|
|
|
819
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
979
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
981
|
if g_param[OptionsDefine.Language]:
|
|
824
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +1017,10 @@ def doSwitchDataEngineImage(args, parsed_globals):
|
|
|
859
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
1019
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
1025
|
else:
|
|
865
1026
|
cred = credential.Credential(
|
|
@@ -871,7 +1032,7 @@ def doSwitchDataEngineImage(args, parsed_globals):
|
|
|
871
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
1034
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
1036
|
if g_param[OptionsDefine.Language]:
|
|
876
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +1072,10 @@ def doCreateSparkAppTask(args, parsed_globals):
|
|
|
911
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1074
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1080
|
else:
|
|
917
1081
|
cred = credential.Credential(
|
|
@@ -923,7 +1087,7 @@ def doCreateSparkAppTask(args, parsed_globals):
|
|
|
923
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
1089
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
1091
|
if g_param[OptionsDefine.Language]:
|
|
928
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1127,10 @@ def doDropDLCTable(args, parsed_globals):
|
|
|
963
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1129
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1135
|
else:
|
|
969
1136
|
cred = credential.Credential(
|
|
@@ -975,7 +1142,7 @@ def doDropDLCTable(args, parsed_globals):
|
|
|
975
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1144
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1146
|
if g_param[OptionsDefine.Language]:
|
|
980
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1182,10 @@ def doDescribeOtherCHDFSBindingList(args, parsed_globals):
|
|
|
1015
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1184
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1190
|
else:
|
|
1021
1191
|
cred = credential.Credential(
|
|
@@ -1027,7 +1197,7 @@ def doDescribeOtherCHDFSBindingList(args, parsed_globals):
|
|
|
1027
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1199
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1201
|
if g_param[OptionsDefine.Language]:
|
|
1032
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1237,10 @@ def doDescribeLakeFsDirSummary(args, parsed_globals):
|
|
|
1067
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1239
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1245
|
else:
|
|
1073
1246
|
cred = credential.Credential(
|
|
@@ -1079,7 +1252,7 @@ def doDescribeLakeFsDirSummary(args, parsed_globals):
|
|
|
1079
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1254
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1256
|
if g_param[OptionsDefine.Language]:
|
|
1084
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1119,7 +1292,10 @@ def doCheckGrantedPermission(args, parsed_globals):
|
|
|
1119
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1294
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1300
|
else:
|
|
1125
1301
|
cred = credential.Credential(
|
|
@@ -1131,7 +1307,7 @@ def doCheckGrantedPermission(args, parsed_globals):
|
|
|
1131
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1309
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1311
|
if g_param[OptionsDefine.Language]:
|
|
1136
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1347,10 @@ def doRevokeDLCCatalogAccess(args, parsed_globals):
|
|
|
1171
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1349
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1355
|
else:
|
|
1177
1356
|
cred = credential.Credential(
|
|
@@ -1183,7 +1362,7 @@ def doRevokeDLCCatalogAccess(args, parsed_globals):
|
|
|
1183
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1364
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1366
|
if g_param[OptionsDefine.Language]:
|
|
1188
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1402,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
1223
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1404
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1410
|
else:
|
|
1229
1411
|
cred = credential.Credential(
|
|
@@ -1235,7 +1417,7 @@ def doCreateUser(args, parsed_globals):
|
|
|
1235
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1419
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1421
|
if g_param[OptionsDefine.Language]:
|
|
1240
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1265,6 +1447,61 @@ def doCreateUser(args, parsed_globals):
|
|
|
1265
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1448
|
|
|
1267
1449
|
|
|
1450
|
+
def doDescribeSparkAppTasks(args, parsed_globals):
|
|
1451
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1452
|
+
|
|
1453
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1454
|
+
cred = credential.CVMRoleCredential()
|
|
1455
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1456
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1457
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1458
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1459
|
+
)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1464
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1465
|
+
else:
|
|
1466
|
+
cred = credential.Credential(
|
|
1467
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1468
|
+
)
|
|
1469
|
+
http_profile = HttpProfile(
|
|
1470
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1471
|
+
reqMethod="POST",
|
|
1472
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1473
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1474
|
+
)
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1476
|
+
if g_param[OptionsDefine.Language]:
|
|
1477
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1478
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1479
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1480
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1481
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1482
|
+
model = models.DescribeSparkAppTasksRequest()
|
|
1483
|
+
model.from_json_string(json.dumps(args))
|
|
1484
|
+
start_time = time.time()
|
|
1485
|
+
while True:
|
|
1486
|
+
rsp = client.DescribeSparkAppTasks(model)
|
|
1487
|
+
result = rsp.to_json_string()
|
|
1488
|
+
try:
|
|
1489
|
+
json_obj = json.loads(result)
|
|
1490
|
+
except TypeError as e:
|
|
1491
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1492
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1493
|
+
break
|
|
1494
|
+
cur_time = time.time()
|
|
1495
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1496
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1497
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1498
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1499
|
+
else:
|
|
1500
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1501
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1502
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1503
|
+
|
|
1504
|
+
|
|
1268
1505
|
def doDescribeDataEngineImageVersions(args, parsed_globals):
|
|
1269
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1507
|
|
|
@@ -1275,7 +1512,10 @@ def doDescribeDataEngineImageVersions(args, parsed_globals):
|
|
|
1275
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1514
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1520
|
else:
|
|
1281
1521
|
cred = credential.Credential(
|
|
@@ -1287,7 +1527,7 @@ def doDescribeDataEngineImageVersions(args, parsed_globals):
|
|
|
1287
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1529
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1531
|
if g_param[OptionsDefine.Language]:
|
|
1292
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1567,10 @@ def doDescribeAdvancedStoreLocation(args, parsed_globals):
|
|
|
1327
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1569
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1575
|
else:
|
|
1333
1576
|
cred = credential.Credential(
|
|
@@ -1339,7 +1582,7 @@ def doDescribeAdvancedStoreLocation(args, parsed_globals):
|
|
|
1339
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1584
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1586
|
if g_param[OptionsDefine.Language]:
|
|
1344
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1622,10 @@ def doDescribeSparkAppJobs(args, parsed_globals):
|
|
|
1379
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1624
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1630
|
else:
|
|
1385
1631
|
cred = credential.Credential(
|
|
@@ -1391,7 +1637,7 @@ def doDescribeSparkAppJobs(args, parsed_globals):
|
|
|
1391
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1639
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1641
|
if g_param[OptionsDefine.Language]:
|
|
1396
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1677,10 @@ def doDescribeUsers(args, parsed_globals):
|
|
|
1431
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1679
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1685
|
else:
|
|
1437
1686
|
cred = credential.Credential(
|
|
@@ -1443,7 +1692,7 @@ def doDescribeUsers(args, parsed_globals):
|
|
|
1443
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1694
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1696
|
if g_param[OptionsDefine.Language]:
|
|
1448
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1732,10 @@ def doCreateTasks(args, parsed_globals):
|
|
|
1483
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1734
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1740
|
else:
|
|
1489
1741
|
cred = credential.Credential(
|
|
@@ -1495,7 +1747,7 @@ def doCreateTasks(args, parsed_globals):
|
|
|
1495
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1749
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1751
|
if g_param[OptionsDefine.Language]:
|
|
1500
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1787,10 @@ def doDescribeDMSDatabaseList(args, parsed_globals):
|
|
|
1535
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1789
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1795
|
else:
|
|
1541
1796
|
cred = credential.Credential(
|
|
@@ -1547,7 +1802,7 @@ def doDescribeDMSDatabaseList(args, parsed_globals):
|
|
|
1547
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1804
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1806
|
if g_param[OptionsDefine.Language]:
|
|
1552
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1842,10 @@ def doModifyWorkGroup(args, parsed_globals):
|
|
|
1587
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1844
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1850
|
else:
|
|
1593
1851
|
cred = credential.Credential(
|
|
@@ -1599,7 +1857,7 @@ def doModifyWorkGroup(args, parsed_globals):
|
|
|
1599
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1859
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1861
|
if g_param[OptionsDefine.Language]:
|
|
1604
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1897,10 @@ def doDescribeTablesName(args, parsed_globals):
|
|
|
1639
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1899
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1905
|
else:
|
|
1645
1906
|
cred = credential.Credential(
|
|
@@ -1651,7 +1912,7 @@ def doDescribeTablesName(args, parsed_globals):
|
|
|
1651
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1914
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1916
|
if g_param[OptionsDefine.Language]:
|
|
1656
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1952,10 @@ def doDeleteCHDFSBindingProduct(args, parsed_globals):
|
|
|
1691
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1954
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1960
|
else:
|
|
1697
1961
|
cred = credential.Credential(
|
|
@@ -1703,7 +1967,7 @@ def doDeleteCHDFSBindingProduct(args, parsed_globals):
|
|
|
1703
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1969
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1971
|
if g_param[OptionsDefine.Language]:
|
|
1708
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +2007,10 @@ def doDescribeUpdatableDataEngines(args, parsed_globals):
|
|
|
1743
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2009
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2015
|
else:
|
|
1749
2016
|
cred = credential.Credential(
|
|
@@ -1755,7 +2022,7 @@ def doDescribeUpdatableDataEngines(args, parsed_globals):
|
|
|
1755
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
2024
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
2026
|
if g_param[OptionsDefine.Language]:
|
|
1760
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +2062,10 @@ def doCreateInternalTable(args, parsed_globals):
|
|
|
1795
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2064
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2070
|
else:
|
|
1801
2071
|
cred = credential.Credential(
|
|
@@ -1807,7 +2077,7 @@ def doCreateInternalTable(args, parsed_globals):
|
|
|
1807
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
2079
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
2081
|
if g_param[OptionsDefine.Language]:
|
|
1812
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +2117,10 @@ def doGenerateCreateMangedTableSql(args, parsed_globals):
|
|
|
1847
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2119
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2125
|
else:
|
|
1853
2126
|
cred = credential.Credential(
|
|
@@ -1859,7 +2132,7 @@ def doGenerateCreateMangedTableSql(args, parsed_globals):
|
|
|
1859
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2134
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2136
|
if g_param[OptionsDefine.Language]:
|
|
1864
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2172,10 @@ def doAttachWorkGroupPolicy(args, parsed_globals):
|
|
|
1899
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2174
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2180
|
else:
|
|
1905
2181
|
cred = credential.Credential(
|
|
@@ -1911,7 +2187,7 @@ def doAttachWorkGroupPolicy(args, parsed_globals):
|
|
|
1911
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2189
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2191
|
if g_param[OptionsDefine.Language]:
|
|
1916
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +2227,10 @@ def doDescribeDataEnginesScaleDetail(args, parsed_globals):
|
|
|
1951
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2229
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2235
|
else:
|
|
1957
2236
|
cred = credential.Credential(
|
|
@@ -1963,7 +2242,7 @@ def doDescribeDataEnginesScaleDetail(args, parsed_globals):
|
|
|
1963
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2244
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2246
|
if g_param[OptionsDefine.Language]:
|
|
1968
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2282,10 @@ def doCreateSparkApp(args, parsed_globals):
|
|
|
2003
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2284
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2290
|
else:
|
|
2009
2291
|
cred = credential.Credential(
|
|
@@ -2015,7 +2297,7 @@ def doCreateSparkApp(args, parsed_globals):
|
|
|
2015
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2299
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2301
|
if g_param[OptionsDefine.Language]:
|
|
2020
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2337,10 @@ def doDescribeThirdPartyAccessUser(args, parsed_globals):
|
|
|
2055
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2339
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2345
|
else:
|
|
2061
2346
|
cred = credential.Credential(
|
|
@@ -2067,7 +2352,7 @@ def doDescribeThirdPartyAccessUser(args, parsed_globals):
|
|
|
2067
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2354
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2356
|
if g_param[OptionsDefine.Language]:
|
|
2072
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2392,10 @@ def doRollbackDataEngineImage(args, parsed_globals):
|
|
|
2107
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2394
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2400
|
else:
|
|
2113
2401
|
cred = credential.Credential(
|
|
@@ -2119,7 +2407,7 @@ def doRollbackDataEngineImage(args, parsed_globals):
|
|
|
2119
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2409
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2411
|
if g_param[OptionsDefine.Language]:
|
|
2124
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2149,6 +2437,61 @@ def doRollbackDataEngineImage(args, parsed_globals):
|
|
|
2149
2437
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2150
2438
|
|
|
2151
2439
|
|
|
2440
|
+
def doDescribeSessionImageVersion(args, parsed_globals):
|
|
2441
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2442
|
+
|
|
2443
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2444
|
+
cred = credential.CVMRoleCredential()
|
|
2445
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2446
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2447
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2448
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2449
|
+
)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2454
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2455
|
+
else:
|
|
2456
|
+
cred = credential.Credential(
|
|
2457
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2458
|
+
)
|
|
2459
|
+
http_profile = HttpProfile(
|
|
2460
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2461
|
+
reqMethod="POST",
|
|
2462
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2463
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2464
|
+
)
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2466
|
+
if g_param[OptionsDefine.Language]:
|
|
2467
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2468
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2469
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2470
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2471
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2472
|
+
model = models.DescribeSessionImageVersionRequest()
|
|
2473
|
+
model.from_json_string(json.dumps(args))
|
|
2474
|
+
start_time = time.time()
|
|
2475
|
+
while True:
|
|
2476
|
+
rsp = client.DescribeSessionImageVersion(model)
|
|
2477
|
+
result = rsp.to_json_string()
|
|
2478
|
+
try:
|
|
2479
|
+
json_obj = json.loads(result)
|
|
2480
|
+
except TypeError as e:
|
|
2481
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2482
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2483
|
+
break
|
|
2484
|
+
cur_time = time.time()
|
|
2485
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2486
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2487
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2488
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2489
|
+
else:
|
|
2490
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2491
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2492
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2493
|
+
|
|
2494
|
+
|
|
2152
2495
|
def doDescribeSubUserAccessPolicy(args, parsed_globals):
|
|
2153
2496
|
g_param = parse_global_arg(parsed_globals)
|
|
2154
2497
|
|
|
@@ -2159,7 +2502,10 @@ def doDescribeSubUserAccessPolicy(args, parsed_globals):
|
|
|
2159
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2504
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2510
|
else:
|
|
2165
2511
|
cred = credential.Credential(
|
|
@@ -2171,7 +2517,7 @@ def doDescribeSubUserAccessPolicy(args, parsed_globals):
|
|
|
2171
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2519
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2521
|
if g_param[OptionsDefine.Language]:
|
|
2176
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2557,10 @@ def doDescribeDLCTableList(args, parsed_globals):
|
|
|
2211
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2559
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2565
|
else:
|
|
2217
2566
|
cred = credential.Credential(
|
|
@@ -2223,7 +2572,7 @@ def doDescribeDLCTableList(args, parsed_globals):
|
|
|
2223
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2574
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2576
|
if g_param[OptionsDefine.Language]:
|
|
2228
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2612,10 @@ def doCreateSparkSessionBatchSQL(args, parsed_globals):
|
|
|
2263
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2614
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2620
|
else:
|
|
2269
2621
|
cred = credential.Credential(
|
|
@@ -2275,7 +2627,7 @@ def doCreateSparkSessionBatchSQL(args, parsed_globals):
|
|
|
2275
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2629
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2631
|
if g_param[OptionsDefine.Language]:
|
|
2280
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2667,10 @@ def doCreateDLCTable(args, parsed_globals):
|
|
|
2315
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2669
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2675
|
else:
|
|
2321
2676
|
cred = credential.Credential(
|
|
@@ -2327,7 +2682,7 @@ def doCreateDLCTable(args, parsed_globals):
|
|
|
2327
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2684
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2686
|
if g_param[OptionsDefine.Language]:
|
|
2332
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2722,10 @@ def doGrantDLCCatalogAccess(args, parsed_globals):
|
|
|
2367
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2724
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2730
|
else:
|
|
2373
2731
|
cred = credential.Credential(
|
|
@@ -2379,7 +2737,7 @@ def doGrantDLCCatalogAccess(args, parsed_globals):
|
|
|
2379
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2739
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2741
|
if g_param[OptionsDefine.Language]:
|
|
2384
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2777,10 @@ def doDescribeQuery(args, parsed_globals):
|
|
|
2419
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2779
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2785
|
else:
|
|
2425
2786
|
cred = credential.Credential(
|
|
@@ -2431,7 +2792,7 @@ def doDescribeQuery(args, parsed_globals):
|
|
|
2431
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2794
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2796
|
if g_param[OptionsDefine.Language]:
|
|
2436
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2832,10 @@ def doDescribeDLCTable(args, parsed_globals):
|
|
|
2471
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2834
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2840
|
else:
|
|
2477
2841
|
cred = credential.Credential(
|
|
@@ -2483,7 +2847,7 @@ def doDescribeDLCTable(args, parsed_globals):
|
|
|
2483
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2849
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2851
|
if g_param[OptionsDefine.Language]:
|
|
2488
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2887,10 @@ def doSuspendResumeDataEngine(args, parsed_globals):
|
|
|
2523
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2889
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2895
|
else:
|
|
2529
2896
|
cred = credential.Credential(
|
|
@@ -2535,7 +2902,7 @@ def doSuspendResumeDataEngine(args, parsed_globals):
|
|
|
2535
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2904
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2906
|
if g_param[OptionsDefine.Language]:
|
|
2540
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2942,10 @@ def doCreateDMSDatabase(args, parsed_globals):
|
|
|
2575
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2944
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2950
|
else:
|
|
2581
2951
|
cred = credential.Credential(
|
|
@@ -2587,7 +2957,7 @@ def doCreateDMSDatabase(args, parsed_globals):
|
|
|
2587
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2959
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2961
|
if g_param[OptionsDefine.Language]:
|
|
2592
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2997,10 @@ def doAttachUserPolicy(args, parsed_globals):
|
|
|
2627
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2999
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
3005
|
else:
|
|
2633
3006
|
cred = credential.Credential(
|
|
@@ -2639,7 +3012,7 @@ def doAttachUserPolicy(args, parsed_globals):
|
|
|
2639
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
3014
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
3016
|
if g_param[OptionsDefine.Language]:
|
|
2644
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +3052,10 @@ def doCopyDLCTable(args, parsed_globals):
|
|
|
2679
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
3054
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3060
|
else:
|
|
2685
3061
|
cred = credential.Credential(
|
|
@@ -2691,7 +3067,7 @@ def doCopyDLCTable(args, parsed_globals):
|
|
|
2691
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
3069
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
3071
|
if g_param[OptionsDefine.Language]:
|
|
2696
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +3107,10 @@ def doCreateResultDownload(args, parsed_globals):
|
|
|
2731
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3109
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3115
|
else:
|
|
2737
3116
|
cred = credential.Credential(
|
|
@@ -2743,7 +3122,7 @@ def doCreateResultDownload(args, parsed_globals):
|
|
|
2743
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3124
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3126
|
if g_param[OptionsDefine.Language]:
|
|
2748
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +3162,10 @@ def doModifyAdvancedStoreLocation(args, parsed_globals):
|
|
|
2783
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3164
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3170
|
else:
|
|
2789
3171
|
cred = credential.Credential(
|
|
@@ -2795,7 +3177,7 @@ def doModifyAdvancedStoreLocation(args, parsed_globals):
|
|
|
2795
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3179
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3181
|
if g_param[OptionsDefine.Language]:
|
|
2800
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +3217,10 @@ def doAlterDMSDatabase(args, parsed_globals):
|
|
|
2835
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3219
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3225
|
else:
|
|
2841
3226
|
cred = credential.Credential(
|
|
@@ -2847,7 +3232,7 @@ def doAlterDMSDatabase(args, parsed_globals):
|
|
|
2847
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3234
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3236
|
if g_param[OptionsDefine.Language]:
|
|
2852
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +3272,10 @@ def doDropDMSDatabase(args, parsed_globals):
|
|
|
2887
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3274
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3280
|
else:
|
|
2893
3281
|
cred = credential.Credential(
|
|
@@ -2899,7 +3287,7 @@ def doDropDMSDatabase(args, parsed_globals):
|
|
|
2899
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3289
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3291
|
if g_param[OptionsDefine.Language]:
|
|
2904
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3327,10 @@ def doUpdateUserDataEngineConfig(args, parsed_globals):
|
|
|
2939
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3329
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3335
|
else:
|
|
2945
3336
|
cred = credential.Credential(
|
|
@@ -2951,7 +3342,7 @@ def doUpdateUserDataEngineConfig(args, parsed_globals):
|
|
|
2951
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3344
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3346
|
if g_param[OptionsDefine.Language]:
|
|
2956
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3382,10 @@ def doModifySparkAppBatch(args, parsed_globals):
|
|
|
2991
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3384
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3390
|
else:
|
|
2997
3391
|
cred = credential.Credential(
|
|
@@ -3003,7 +3397,7 @@ def doModifySparkAppBatch(args, parsed_globals):
|
|
|
3003
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3399
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3401
|
if g_param[OptionsDefine.Language]:
|
|
3008
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3437,10 @@ def doCheckDataEngineImageCanBeUpgrade(args, parsed_globals):
|
|
|
3043
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3439
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3445
|
else:
|
|
3049
3446
|
cred = credential.Credential(
|
|
@@ -3055,7 +3452,7 @@ def doCheckDataEngineImageCanBeUpgrade(args, parsed_globals):
|
|
|
3055
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3454
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3456
|
if g_param[OptionsDefine.Language]:
|
|
3060
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3492,10 @@ def doDeleteSparkApp(args, parsed_globals):
|
|
|
3095
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3494
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3500
|
else:
|
|
3101
3501
|
cred = credential.Credential(
|
|
@@ -3107,7 +3507,7 @@ def doDeleteSparkApp(args, parsed_globals):
|
|
|
3107
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3509
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3511
|
if g_param[OptionsDefine.Language]:
|
|
3112
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3547,10 @@ def doDescribeResultDownload(args, parsed_globals):
|
|
|
3147
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3549
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3555
|
else:
|
|
3153
3556
|
cred = credential.Credential(
|
|
@@ -3159,7 +3562,7 @@ def doDescribeResultDownload(args, parsed_globals):
|
|
|
3159
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3564
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3566
|
if g_param[OptionsDefine.Language]:
|
|
3164
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3602,10 @@ def doQueryTaskCostDetail(args, parsed_globals):
|
|
|
3199
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3604
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3610
|
else:
|
|
3205
3611
|
cred = credential.Credential(
|
|
@@ -3211,7 +3617,7 @@ def doQueryTaskCostDetail(args, parsed_globals):
|
|
|
3211
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3619
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3621
|
if g_param[OptionsDefine.Language]:
|
|
3216
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3657,10 @@ def doCreateWorkGroup(args, parsed_globals):
|
|
|
3251
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3659
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3665
|
else:
|
|
3257
3666
|
cred = credential.Credential(
|
|
@@ -3263,7 +3672,7 @@ def doCreateWorkGroup(args, parsed_globals):
|
|
|
3263
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3674
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3676
|
if g_param[OptionsDefine.Language]:
|
|
3268
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3712,10 @@ def doCreateCHDFSBindingProduct(args, parsed_globals):
|
|
|
3303
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3714
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3720
|
else:
|
|
3309
3721
|
cred = credential.Credential(
|
|
@@ -3315,7 +3727,7 @@ def doCreateCHDFSBindingProduct(args, parsed_globals):
|
|
|
3315
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3729
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3731
|
if g_param[OptionsDefine.Language]:
|
|
3320
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3767,10 @@ def doCheckDataEngineImageCanBeRollback(args, parsed_globals):
|
|
|
3355
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3769
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3775
|
else:
|
|
3361
3776
|
cred = credential.Credential(
|
|
@@ -3367,7 +3782,7 @@ def doCheckDataEngineImageCanBeRollback(args, parsed_globals):
|
|
|
3367
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3784
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3786
|
if g_param[OptionsDefine.Language]:
|
|
3372
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3822,10 @@ def doDescribeJob(args, parsed_globals):
|
|
|
3407
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3824
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3830
|
else:
|
|
3413
3831
|
cred = credential.Credential(
|
|
@@ -3419,7 +3837,7 @@ def doDescribeJob(args, parsed_globals):
|
|
|
3419
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3839
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3841
|
if g_param[OptionsDefine.Language]:
|
|
3424
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3877,10 @@ def doCancelSparkSessionBatchSQL(args, parsed_globals):
|
|
|
3459
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3879
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3885
|
else:
|
|
3465
3886
|
cred = credential.Credential(
|
|
@@ -3471,7 +3892,7 @@ def doCancelSparkSessionBatchSQL(args, parsed_globals):
|
|
|
3471
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3894
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3896
|
if g_param[OptionsDefine.Language]:
|
|
3476
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +3932,10 @@ def doCancelTask(args, parsed_globals):
|
|
|
3511
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3934
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3940
|
else:
|
|
3517
3941
|
cred = credential.Credential(
|
|
@@ -3523,7 +3947,7 @@ def doCancelTask(args, parsed_globals):
|
|
|
3523
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3949
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3951
|
if g_param[OptionsDefine.Language]:
|
|
3528
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +3987,10 @@ def doModifySparkApp(args, parsed_globals):
|
|
|
3563
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3989
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3995
|
else:
|
|
3569
3996
|
cred = credential.Credential(
|
|
@@ -3575,7 +4002,7 @@ def doModifySparkApp(args, parsed_globals):
|
|
|
3575
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
4004
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
4006
|
if g_param[OptionsDefine.Language]:
|
|
3580
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +4042,10 @@ def doGetOptimizerPolicy(args, parsed_globals):
|
|
|
3615
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
4044
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
4050
|
else:
|
|
3621
4051
|
cred = credential.Credential(
|
|
@@ -3627,7 +4057,7 @@ def doGetOptimizerPolicy(args, parsed_globals):
|
|
|
3627
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
4059
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
4061
|
if g_param[OptionsDefine.Language]:
|
|
3632
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +4097,10 @@ def doDescribeUserInfo(args, parsed_globals):
|
|
|
3667
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
4099
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
4105
|
else:
|
|
3673
4106
|
cred = credential.Credential(
|
|
@@ -3679,7 +4112,7 @@ def doDescribeUserInfo(args, parsed_globals):
|
|
|
3679
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
4114
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
4116
|
if g_param[OptionsDefine.Language]:
|
|
3684
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +4152,10 @@ def doUpdateDataEngine(args, parsed_globals):
|
|
|
3719
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4154
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4160
|
else:
|
|
3725
4161
|
cred = credential.Credential(
|
|
@@ -3731,7 +4167,7 @@ def doUpdateDataEngine(args, parsed_globals):
|
|
|
3731
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4169
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4171
|
if g_param[OptionsDefine.Language]:
|
|
3736
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +4207,10 @@ def doCheckDataEngineConfigPairsValidity(args, parsed_globals):
|
|
|
3771
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4209
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4215
|
else:
|
|
3777
4216
|
cred = credential.Credential(
|
|
@@ -3783,7 +4222,7 @@ def doCheckDataEngineConfigPairsValidity(args, parsed_globals):
|
|
|
3783
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4224
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4226
|
if g_param[OptionsDefine.Language]:
|
|
3788
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +4262,10 @@ def doDeleteDataEngine(args, parsed_globals):
|
|
|
3823
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4264
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4270
|
else:
|
|
3829
4271
|
cred = credential.Credential(
|
|
@@ -3835,7 +4277,7 @@ def doDeleteDataEngine(args, parsed_globals):
|
|
|
3835
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4279
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4281
|
if g_param[OptionsDefine.Language]:
|
|
3840
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3875,7 +4317,10 @@ def doDeleteUser(args, parsed_globals):
|
|
|
3875
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4319
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4325
|
else:
|
|
3881
4326
|
cred = credential.Credential(
|
|
@@ -3887,7 +4332,7 @@ def doDeleteUser(args, parsed_globals):
|
|
|
3887
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4334
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4336
|
if g_param[OptionsDefine.Language]:
|
|
3892
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3927,7 +4372,10 @@ def doDescribeEngineUsageInfo(args, parsed_globals):
|
|
|
3927
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4374
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4380
|
else:
|
|
3933
4381
|
cred = credential.Credential(
|
|
@@ -3939,7 +4387,7 @@ def doDescribeEngineUsageInfo(args, parsed_globals):
|
|
|
3939
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4389
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4391
|
if g_param[OptionsDefine.Language]:
|
|
3944
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3979,7 +4427,10 @@ def doUpdateDataEngineConfig(args, parsed_globals):
|
|
|
3979
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4429
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4435
|
else:
|
|
3985
4436
|
cred = credential.Credential(
|
|
@@ -3991,7 +4442,7 @@ def doUpdateDataEngineConfig(args, parsed_globals):
|
|
|
3991
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4444
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4446
|
if g_param[OptionsDefine.Language]:
|
|
3996
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4031,7 +4482,10 @@ def doUpdateRowFilter(args, parsed_globals):
|
|
|
4031
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4484
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4490
|
else:
|
|
4037
4491
|
cred = credential.Credential(
|
|
@@ -4043,7 +4497,7 @@ def doUpdateRowFilter(args, parsed_globals):
|
|
|
4043
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4499
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4501
|
if g_param[OptionsDefine.Language]:
|
|
4048
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4083,7 +4537,10 @@ def doUpgradeDataEngineImage(args, parsed_globals):
|
|
|
4083
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4539
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4545
|
else:
|
|
4089
4546
|
cred = credential.Credential(
|
|
@@ -4095,7 +4552,7 @@ def doUpgradeDataEngineImage(args, parsed_globals):
|
|
|
4095
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4554
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4556
|
if g_param[OptionsDefine.Language]:
|
|
4100
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4135,7 +4592,10 @@ def doDetachUserPolicy(args, parsed_globals):
|
|
|
4135
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4594
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4600
|
else:
|
|
4141
4601
|
cred = credential.Credential(
|
|
@@ -4147,7 +4607,7 @@ def doDetachUserPolicy(args, parsed_globals):
|
|
|
4147
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4609
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4611
|
if g_param[OptionsDefine.Language]:
|
|
4152
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4187,7 +4647,10 @@ def doDetachWorkGroupPolicy(args, parsed_globals):
|
|
|
4187
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4649
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4655
|
else:
|
|
4193
4656
|
cred = credential.Credential(
|
|
@@ -4199,7 +4662,7 @@ def doDetachWorkGroupPolicy(args, parsed_globals):
|
|
|
4199
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4664
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4666
|
if g_param[OptionsDefine.Language]:
|
|
4204
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4239,7 +4702,10 @@ def doQueryResult(args, parsed_globals):
|
|
|
4239
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4704
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4710
|
else:
|
|
4245
4711
|
cred = credential.Credential(
|
|
@@ -4251,7 +4717,7 @@ def doQueryResult(args, parsed_globals):
|
|
|
4251
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4719
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4721
|
if g_param[OptionsDefine.Language]:
|
|
4256
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4291,7 +4757,10 @@ def doModifyGovernEventRule(args, parsed_globals):
|
|
|
4291
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4759
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4765
|
else:
|
|
4297
4766
|
cred = credential.Credential(
|
|
@@ -4303,7 +4772,7 @@ def doModifyGovernEventRule(args, parsed_globals):
|
|
|
4303
4772
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4773
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4774
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4776
|
if g_param[OptionsDefine.Language]:
|
|
4308
4777
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4778
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4343,7 +4812,10 @@ def doDescribeJobs(args, parsed_globals):
|
|
|
4343
4812
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4813
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4814
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4820
|
else:
|
|
4349
4821
|
cred = credential.Credential(
|
|
@@ -4355,7 +4827,7 @@ def doDescribeJobs(args, parsed_globals):
|
|
|
4355
4827
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4828
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4829
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4831
|
if g_param[OptionsDefine.Language]:
|
|
4360
4832
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4833
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4395,7 +4867,10 @@ def doRegisterThirdPartyAccessUser(args, parsed_globals):
|
|
|
4395
4867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4868
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4869
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4874
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4875
|
else:
|
|
4401
4876
|
cred = credential.Credential(
|
|
@@ -4407,7 +4882,7 @@ def doRegisterThirdPartyAccessUser(args, parsed_globals):
|
|
|
4407
4882
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4883
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4884
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4886
|
if g_param[OptionsDefine.Language]:
|
|
4412
4887
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4888
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +4922,10 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
|
|
|
4447
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4924
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4930
|
else:
|
|
4453
4931
|
cred = credential.Credential(
|
|
@@ -4459,7 +4937,7 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
|
|
|
4459
4937
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
4938
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
4939
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
4941
|
if g_param[OptionsDefine.Language]:
|
|
4464
4942
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
4943
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4489,7 +4967,7 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
|
|
|
4489
4967
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4490
4968
|
|
|
4491
4969
|
|
|
4492
|
-
def
|
|
4970
|
+
def doCreateDataEngine(args, parsed_globals):
|
|
4493
4971
|
g_param = parse_global_arg(parsed_globals)
|
|
4494
4972
|
|
|
4495
4973
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4499,7 +4977,10 @@ def doDescribeSparkAppTasks(args, parsed_globals):
|
|
|
4499
4977
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4978
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4979
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4984
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4985
|
else:
|
|
4505
4986
|
cred = credential.Credential(
|
|
@@ -4511,18 +4992,18 @@ def doDescribeSparkAppTasks(args, parsed_globals):
|
|
|
4511
4992
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
4993
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
4994
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
4996
|
if g_param[OptionsDefine.Language]:
|
|
4516
4997
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
4998
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4518
4999
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4519
5000
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4520
5001
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4521
|
-
model = models.
|
|
5002
|
+
model = models.CreateDataEngineRequest()
|
|
4522
5003
|
model.from_json_string(json.dumps(args))
|
|
4523
5004
|
start_time = time.time()
|
|
4524
5005
|
while True:
|
|
4525
|
-
rsp = client.
|
|
5006
|
+
rsp = client.CreateDataEngine(model)
|
|
4526
5007
|
result = rsp.to_json_string()
|
|
4527
5008
|
try:
|
|
4528
5009
|
json_obj = json.loads(result)
|
|
@@ -4551,7 +5032,10 @@ def doUnbindWorkGroupsFromUser(args, parsed_globals):
|
|
|
4551
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
5034
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
5040
|
else:
|
|
4557
5041
|
cred = credential.Credential(
|
|
@@ -4563,7 +5047,7 @@ def doUnbindWorkGroupsFromUser(args, parsed_globals):
|
|
|
4563
5047
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
5048
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
5049
|
)
|
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4567
5051
|
if g_param[OptionsDefine.Language]:
|
|
4568
5052
|
profile.language = g_param[OptionsDefine.Language]
|
|
4569
5053
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4603,7 +5087,10 @@ def doDescribeWorkGroups(args, parsed_globals):
|
|
|
4603
5087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
5088
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
5089
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
5094
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
5095
|
else:
|
|
4609
5096
|
cred = credential.Credential(
|
|
@@ -4615,7 +5102,7 @@ def doDescribeWorkGroups(args, parsed_globals):
|
|
|
4615
5102
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4616
5103
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4617
5104
|
)
|
|
4618
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4619
5106
|
if g_param[OptionsDefine.Language]:
|
|
4620
5107
|
profile.language = g_param[OptionsDefine.Language]
|
|
4621
5108
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4655,7 +5142,10 @@ def doRestartDataEngine(args, parsed_globals):
|
|
|
4655
5142
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
5143
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
5144
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
5149
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
5150
|
else:
|
|
4661
5151
|
cred = credential.Credential(
|
|
@@ -4667,7 +5157,7 @@ def doRestartDataEngine(args, parsed_globals):
|
|
|
4667
5157
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4668
5158
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4669
5159
|
)
|
|
4670
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5160
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4671
5161
|
if g_param[OptionsDefine.Language]:
|
|
4672
5162
|
profile.language = g_param[OptionsDefine.Language]
|
|
4673
5163
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4697,6 +5187,61 @@ def doRestartDataEngine(args, parsed_globals):
|
|
|
4697
5187
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4698
5188
|
|
|
4699
5189
|
|
|
5190
|
+
def doAttachDataMaskPolicy(args, parsed_globals):
|
|
5191
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5192
|
+
|
|
5193
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5194
|
+
cred = credential.CVMRoleCredential()
|
|
5195
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5196
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5197
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5198
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5199
|
+
)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5204
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5205
|
+
else:
|
|
5206
|
+
cred = credential.Credential(
|
|
5207
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5208
|
+
)
|
|
5209
|
+
http_profile = HttpProfile(
|
|
5210
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5211
|
+
reqMethod="POST",
|
|
5212
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5213
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5214
|
+
)
|
|
5215
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5216
|
+
if g_param[OptionsDefine.Language]:
|
|
5217
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5218
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5219
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5220
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5221
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5222
|
+
model = models.AttachDataMaskPolicyRequest()
|
|
5223
|
+
model.from_json_string(json.dumps(args))
|
|
5224
|
+
start_time = time.time()
|
|
5225
|
+
while True:
|
|
5226
|
+
rsp = client.AttachDataMaskPolicy(model)
|
|
5227
|
+
result = rsp.to_json_string()
|
|
5228
|
+
try:
|
|
5229
|
+
json_obj = json.loads(result)
|
|
5230
|
+
except TypeError as e:
|
|
5231
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5232
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5233
|
+
break
|
|
5234
|
+
cur_time = time.time()
|
|
5235
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5236
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5237
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5238
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5239
|
+
else:
|
|
5240
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5241
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5242
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5243
|
+
|
|
5244
|
+
|
|
4700
5245
|
def doRenewDataEngine(args, parsed_globals):
|
|
4701
5246
|
g_param = parse_global_arg(parsed_globals)
|
|
4702
5247
|
|
|
@@ -4707,7 +5252,10 @@ def doRenewDataEngine(args, parsed_globals):
|
|
|
4707
5252
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4708
5253
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4709
5254
|
)
|
|
4710
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
5259
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
5260
|
else:
|
|
4713
5261
|
cred = credential.Credential(
|
|
@@ -4719,7 +5267,7 @@ def doRenewDataEngine(args, parsed_globals):
|
|
|
4719
5267
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4720
5268
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4721
5269
|
)
|
|
4722
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5270
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4723
5271
|
if g_param[OptionsDefine.Language]:
|
|
4724
5272
|
profile.language = g_param[OptionsDefine.Language]
|
|
4725
5273
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4759,7 +5307,10 @@ def doDeleteThirdPartyAccessUser(args, parsed_globals):
|
|
|
4759
5307
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
5308
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
5309
|
)
|
|
4762
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5310
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5311
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5312
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
5314
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
5315
|
else:
|
|
4765
5316
|
cred = credential.Credential(
|
|
@@ -4771,7 +5322,7 @@ def doDeleteThirdPartyAccessUser(args, parsed_globals):
|
|
|
4771
5322
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4772
5323
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4773
5324
|
)
|
|
4774
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5325
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4775
5326
|
if g_param[OptionsDefine.Language]:
|
|
4776
5327
|
profile.language = g_param[OptionsDefine.Language]
|
|
4777
5328
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4811,7 +5362,10 @@ def doDescribeDMSDatabase(args, parsed_globals):
|
|
|
4811
5362
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4812
5363
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4813
5364
|
)
|
|
4814
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5365
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5366
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5367
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4815
5369
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4816
5370
|
else:
|
|
4817
5371
|
cred = credential.Credential(
|
|
@@ -4823,7 +5377,7 @@ def doDescribeDMSDatabase(args, parsed_globals):
|
|
|
4823
5377
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4824
5378
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4825
5379
|
)
|
|
4826
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5380
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4827
5381
|
if g_param[OptionsDefine.Language]:
|
|
4828
5382
|
profile.language = g_param[OptionsDefine.Language]
|
|
4829
5383
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4863,7 +5417,10 @@ def doBindWorkGroupsToUser(args, parsed_globals):
|
|
|
4863
5417
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4864
5418
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4865
5419
|
)
|
|
4866
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5420
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5421
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5422
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4867
5424
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4868
5425
|
else:
|
|
4869
5426
|
cred = credential.Credential(
|
|
@@ -4875,7 +5432,7 @@ def doBindWorkGroupsToUser(args, parsed_globals):
|
|
|
4875
5432
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4876
5433
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4877
5434
|
)
|
|
4878
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5435
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4879
5436
|
if g_param[OptionsDefine.Language]:
|
|
4880
5437
|
profile.language = g_param[OptionsDefine.Language]
|
|
4881
5438
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4915,7 +5472,10 @@ def doDescribeUserDataEngineConfig(args, parsed_globals):
|
|
|
4915
5472
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4916
5473
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4917
5474
|
)
|
|
4918
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5475
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5476
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5477
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4919
5479
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4920
5480
|
else:
|
|
4921
5481
|
cred = credential.Credential(
|
|
@@ -4927,7 +5487,7 @@ def doDescribeUserDataEngineConfig(args, parsed_globals):
|
|
|
4927
5487
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4928
5488
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4929
5489
|
)
|
|
4930
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5490
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4931
5491
|
if g_param[OptionsDefine.Language]:
|
|
4932
5492
|
profile.language = g_param[OptionsDefine.Language]
|
|
4933
5493
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4967,7 +5527,10 @@ def doModifyUser(args, parsed_globals):
|
|
|
4967
5527
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4968
5528
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4969
5529
|
)
|
|
4970
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5530
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5531
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5532
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4971
5534
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4972
5535
|
else:
|
|
4973
5536
|
cred = credential.Credential(
|
|
@@ -4979,7 +5542,7 @@ def doModifyUser(args, parsed_globals):
|
|
|
4979
5542
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4980
5543
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4981
5544
|
)
|
|
4982
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5545
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4983
5546
|
if g_param[OptionsDefine.Language]:
|
|
4984
5547
|
profile.language = g_param[OptionsDefine.Language]
|
|
4985
5548
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5019,7 +5582,10 @@ def doModifyDataEngineDescription(args, parsed_globals):
|
|
|
5019
5582
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5020
5583
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5021
5584
|
)
|
|
5022
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5585
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5586
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5587
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5023
5589
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5024
5590
|
else:
|
|
5025
5591
|
cred = credential.Credential(
|
|
@@ -5031,7 +5597,7 @@ def doModifyDataEngineDescription(args, parsed_globals):
|
|
|
5031
5597
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5032
5598
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5033
5599
|
)
|
|
5034
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5600
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5035
5601
|
if g_param[OptionsDefine.Language]:
|
|
5036
5602
|
profile.language = g_param[OptionsDefine.Language]
|
|
5037
5603
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5071,7 +5637,10 @@ def doDropDMSTable(args, parsed_globals):
|
|
|
5071
5637
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5072
5638
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5073
5639
|
)
|
|
5074
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5640
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5641
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5642
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5075
5644
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5076
5645
|
else:
|
|
5077
5646
|
cred = credential.Credential(
|
|
@@ -5083,7 +5652,7 @@ def doDropDMSTable(args, parsed_globals):
|
|
|
5083
5652
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5084
5653
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5085
5654
|
)
|
|
5086
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5655
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5087
5656
|
if g_param[OptionsDefine.Language]:
|
|
5088
5657
|
profile.language = g_param[OptionsDefine.Language]
|
|
5089
5658
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5113,6 +5682,61 @@ def doDropDMSTable(args, parsed_globals):
|
|
|
5113
5682
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5114
5683
|
|
|
5115
5684
|
|
|
5685
|
+
def doCreateDataMaskStrategy(args, parsed_globals):
|
|
5686
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5687
|
+
|
|
5688
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5689
|
+
cred = credential.CVMRoleCredential()
|
|
5690
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5691
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5692
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5693
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5694
|
+
)
|
|
5695
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5696
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5697
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5699
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5700
|
+
else:
|
|
5701
|
+
cred = credential.Credential(
|
|
5702
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5703
|
+
)
|
|
5704
|
+
http_profile = HttpProfile(
|
|
5705
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5706
|
+
reqMethod="POST",
|
|
5707
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5708
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5709
|
+
)
|
|
5710
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5711
|
+
if g_param[OptionsDefine.Language]:
|
|
5712
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5713
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5714
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5715
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5716
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5717
|
+
model = models.CreateDataMaskStrategyRequest()
|
|
5718
|
+
model.from_json_string(json.dumps(args))
|
|
5719
|
+
start_time = time.time()
|
|
5720
|
+
while True:
|
|
5721
|
+
rsp = client.CreateDataMaskStrategy(model)
|
|
5722
|
+
result = rsp.to_json_string()
|
|
5723
|
+
try:
|
|
5724
|
+
json_obj = json.loads(result)
|
|
5725
|
+
except TypeError as e:
|
|
5726
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5727
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5728
|
+
break
|
|
5729
|
+
cur_time = time.time()
|
|
5730
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5731
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5732
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5733
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5734
|
+
else:
|
|
5735
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5736
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5737
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5738
|
+
|
|
5739
|
+
|
|
5116
5740
|
def doDescribeStoreLocation(args, parsed_globals):
|
|
5117
5741
|
g_param = parse_global_arg(parsed_globals)
|
|
5118
5742
|
|
|
@@ -5123,7 +5747,10 @@ def doDescribeStoreLocation(args, parsed_globals):
|
|
|
5123
5747
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5124
5748
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5125
5749
|
)
|
|
5126
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5750
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5751
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5752
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5127
5754
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5128
5755
|
else:
|
|
5129
5756
|
cred = credential.Credential(
|
|
@@ -5135,7 +5762,7 @@ def doDescribeStoreLocation(args, parsed_globals):
|
|
|
5135
5762
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5136
5763
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5137
5764
|
)
|
|
5138
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5765
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5139
5766
|
if g_param[OptionsDefine.Language]:
|
|
5140
5767
|
profile.language = g_param[OptionsDefine.Language]
|
|
5141
5768
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5175,7 +5802,10 @@ def doDescribeSparkAppJob(args, parsed_globals):
|
|
|
5175
5802
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5176
5803
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5177
5804
|
)
|
|
5178
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5805
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5806
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5807
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5179
5809
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5180
5810
|
else:
|
|
5181
5811
|
cred = credential.Credential(
|
|
@@ -5187,7 +5817,7 @@ def doDescribeSparkAppJob(args, parsed_globals):
|
|
|
5187
5817
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5188
5818
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5189
5819
|
)
|
|
5190
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5820
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5191
5821
|
if g_param[OptionsDefine.Language]:
|
|
5192
5822
|
profile.language = g_param[OptionsDefine.Language]
|
|
5193
5823
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5217,7 +5847,7 @@ def doDescribeSparkAppJob(args, parsed_globals):
|
|
|
5217
5847
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5218
5848
|
|
|
5219
5849
|
|
|
5220
|
-
def
|
|
5850
|
+
def doUpdateDataMaskStrategy(args, parsed_globals):
|
|
5221
5851
|
g_param = parse_global_arg(parsed_globals)
|
|
5222
5852
|
|
|
5223
5853
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -5227,7 +5857,10 @@ def doCreateDataEngine(args, parsed_globals):
|
|
|
5227
5857
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5228
5858
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5229
5859
|
)
|
|
5230
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5860
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5861
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5862
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5231
5864
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5232
5865
|
else:
|
|
5233
5866
|
cred = credential.Credential(
|
|
@@ -5239,18 +5872,18 @@ def doCreateDataEngine(args, parsed_globals):
|
|
|
5239
5872
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5240
5873
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5241
5874
|
)
|
|
5242
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5875
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5243
5876
|
if g_param[OptionsDefine.Language]:
|
|
5244
5877
|
profile.language = g_param[OptionsDefine.Language]
|
|
5245
5878
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5246
5879
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5247
5880
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
5248
5881
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5249
|
-
model = models.
|
|
5882
|
+
model = models.UpdateDataMaskStrategyRequest()
|
|
5250
5883
|
model.from_json_string(json.dumps(args))
|
|
5251
5884
|
start_time = time.time()
|
|
5252
5885
|
while True:
|
|
5253
|
-
rsp = client.
|
|
5886
|
+
rsp = client.UpdateDataMaskStrategy(model)
|
|
5254
5887
|
result = rsp.to_json_string()
|
|
5255
5888
|
try:
|
|
5256
5889
|
json_obj = json.loads(result)
|
|
@@ -5279,7 +5912,10 @@ def doDescribeDataEnginePythonSparkImages(args, parsed_globals):
|
|
|
5279
5912
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5280
5913
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5281
5914
|
)
|
|
5282
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5915
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5916
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5917
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5283
5919
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5284
5920
|
else:
|
|
5285
5921
|
cred = credential.Credential(
|
|
@@ -5291,7 +5927,7 @@ def doDescribeDataEnginePythonSparkImages(args, parsed_globals):
|
|
|
5291
5927
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5292
5928
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5293
5929
|
)
|
|
5294
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5930
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5295
5931
|
if g_param[OptionsDefine.Language]:
|
|
5296
5932
|
profile.language = g_param[OptionsDefine.Language]
|
|
5297
5933
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5331,7 +5967,10 @@ def doDescribeLakeFsInfo(args, parsed_globals):
|
|
|
5331
5967
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5332
5968
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5333
5969
|
)
|
|
5334
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5970
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5971
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5972
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5335
5974
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5336
5975
|
else:
|
|
5337
5976
|
cred = credential.Credential(
|
|
@@ -5343,7 +5982,7 @@ def doDescribeLakeFsInfo(args, parsed_globals):
|
|
|
5343
5982
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5344
5983
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5345
5984
|
)
|
|
5346
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5985
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5347
5986
|
if g_param[OptionsDefine.Language]:
|
|
5348
5987
|
profile.language = g_param[OptionsDefine.Language]
|
|
5349
5988
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5391,11 +6030,13 @@ ACTION_MAP = {
|
|
|
5391
6030
|
"DescribeUserRoles": doDescribeUserRoles,
|
|
5392
6031
|
"ModifyUserType": doModifyUserType,
|
|
5393
6032
|
"DescribeWorkGroupInfo": doDescribeWorkGroupInfo,
|
|
6033
|
+
"DescribeDataMaskStrategies": doDescribeDataMaskStrategies,
|
|
5394
6034
|
"DeleteWorkGroup": doDeleteWorkGroup,
|
|
5395
6035
|
"DescribeDataEngine": doDescribeDataEngine,
|
|
5396
6036
|
"CreateStoreLocation": doCreateStoreLocation,
|
|
5397
6037
|
"SwitchDataEngine": doSwitchDataEngine,
|
|
5398
6038
|
"DescribeSparkSessionBatchSqlLog": doDescribeSparkSessionBatchSqlLog,
|
|
6039
|
+
"DeleteDataMaskStrategy": doDeleteDataMaskStrategy,
|
|
5399
6040
|
"DescribeDLCCatalogAccess": doDescribeDLCCatalogAccess,
|
|
5400
6041
|
"DescribeUserType": doDescribeUserType,
|
|
5401
6042
|
"DescribeTasks": doDescribeTasks,
|
|
@@ -5408,6 +6049,7 @@ ACTION_MAP = {
|
|
|
5408
6049
|
"CheckGrantedPermission": doCheckGrantedPermission,
|
|
5409
6050
|
"RevokeDLCCatalogAccess": doRevokeDLCCatalogAccess,
|
|
5410
6051
|
"CreateUser": doCreateUser,
|
|
6052
|
+
"DescribeSparkAppTasks": doDescribeSparkAppTasks,
|
|
5411
6053
|
"DescribeDataEngineImageVersions": doDescribeDataEngineImageVersions,
|
|
5412
6054
|
"DescribeAdvancedStoreLocation": doDescribeAdvancedStoreLocation,
|
|
5413
6055
|
"DescribeSparkAppJobs": doDescribeSparkAppJobs,
|
|
@@ -5425,6 +6067,7 @@ ACTION_MAP = {
|
|
|
5425
6067
|
"CreateSparkApp": doCreateSparkApp,
|
|
5426
6068
|
"DescribeThirdPartyAccessUser": doDescribeThirdPartyAccessUser,
|
|
5427
6069
|
"RollbackDataEngineImage": doRollbackDataEngineImage,
|
|
6070
|
+
"DescribeSessionImageVersion": doDescribeSessionImageVersion,
|
|
5428
6071
|
"DescribeSubUserAccessPolicy": doDescribeSubUserAccessPolicy,
|
|
5429
6072
|
"DescribeDLCTableList": doDescribeDLCTableList,
|
|
5430
6073
|
"CreateSparkSessionBatchSQL": doCreateSparkSessionBatchSQL,
|
|
@@ -5470,10 +6113,11 @@ ACTION_MAP = {
|
|
|
5470
6113
|
"DescribeJobs": doDescribeJobs,
|
|
5471
6114
|
"RegisterThirdPartyAccessUser": doRegisterThirdPartyAccessUser,
|
|
5472
6115
|
"DeleteUsersFromWorkGroup": doDeleteUsersFromWorkGroup,
|
|
5473
|
-
"
|
|
6116
|
+
"CreateDataEngine": doCreateDataEngine,
|
|
5474
6117
|
"UnbindWorkGroupsFromUser": doUnbindWorkGroupsFromUser,
|
|
5475
6118
|
"DescribeWorkGroups": doDescribeWorkGroups,
|
|
5476
6119
|
"RestartDataEngine": doRestartDataEngine,
|
|
6120
|
+
"AttachDataMaskPolicy": doAttachDataMaskPolicy,
|
|
5477
6121
|
"RenewDataEngine": doRenewDataEngine,
|
|
5478
6122
|
"DeleteThirdPartyAccessUser": doDeleteThirdPartyAccessUser,
|
|
5479
6123
|
"DescribeDMSDatabase": doDescribeDMSDatabase,
|
|
@@ -5482,9 +6126,10 @@ ACTION_MAP = {
|
|
|
5482
6126
|
"ModifyUser": doModifyUser,
|
|
5483
6127
|
"ModifyDataEngineDescription": doModifyDataEngineDescription,
|
|
5484
6128
|
"DropDMSTable": doDropDMSTable,
|
|
6129
|
+
"CreateDataMaskStrategy": doCreateDataMaskStrategy,
|
|
5485
6130
|
"DescribeStoreLocation": doDescribeStoreLocation,
|
|
5486
6131
|
"DescribeSparkAppJob": doDescribeSparkAppJob,
|
|
5487
|
-
"
|
|
6132
|
+
"UpdateDataMaskStrategy": doUpdateDataMaskStrategy,
|
|
5488
6133
|
"DescribeDataEnginePythonSparkImages": doDescribeDataEnginePythonSparkImages,
|
|
5489
6134
|
"DescribeLakeFsInfo": doDescribeLakeFsInfo,
|
|
5490
6135
|
|