tccli-intl-en 3.0.1248.1__py2.py3-none-any.whl → 3.1.33.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (245) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/services/__init__.py +32 -1
  4. tccli/services/advisor/advisor_client.py +10 -4
  5. tccli/services/ai3d/__init__.py +4 -0
  6. tccli/services/ai3d/ai3d_client.py +266 -0
  7. tccli/services/ai3d/v20250513/api.json +264 -0
  8. tccli/services/ai3d/v20250513/examples.json +20 -0
  9. tccli/services/aiart/aiart_client.py +5 -2
  10. tccli/services/ams/ams_client.py +20 -8
  11. tccli/services/antiddos/antiddos_client.py +350 -140
  12. tccli/services/apigateway/apigateway_client.py +465 -186
  13. tccli/services/apm/apm_client.py +835 -68
  14. tccli/services/apm/v20210622/api.json +3936 -1145
  15. tccli/services/apm/v20210622/examples.json +133 -23
  16. tccli/services/asr/asr_client.py +10 -4
  17. tccli/services/autoscaling/autoscaling_client.py +290 -116
  18. tccli/services/autoscaling/v20180419/api.json +78 -28
  19. tccli/services/batch/batch_client.py +140 -56
  20. tccli/services/bi/bi_client.py +120 -48
  21. tccli/services/billing/billing_client.py +210 -84
  22. tccli/services/cam/cam_client.py +405 -162
  23. tccli/services/captcha/captcha_client.py +5 -2
  24. tccli/services/car/car_client.py +165 -66
  25. tccli/services/cbs/cbs_client.py +190 -76
  26. tccli/services/ccc/ccc_client.py +794 -160
  27. tccli/services/ccc/v20200210/api.json +1778 -202
  28. tccli/services/ccc/v20200210/examples.json +64 -0
  29. tccli/services/cdb/cdb_client.py +1770 -531
  30. tccli/services/cdb/v20170320/api.json +2166 -335
  31. tccli/services/cdb/v20170320/examples.json +126 -6
  32. tccli/services/cdc/cdc_client.py +100 -40
  33. tccli/services/cdc/v20201214/api.json +2 -2
  34. tccli/services/cdc/v20201214/examples.json +4 -4
  35. tccli/services/cdn/cdn_client.py +220 -88
  36. tccli/services/cdn/v20180606/api.json +22 -22
  37. tccli/services/cdn/v20180606/examples.json +1 -1
  38. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  39. tccli/services/cdwpg/cdwpg_client.py +120 -48
  40. tccli/services/cdz/__init__.py +4 -0
  41. tccli/services/cdz/cdz_client.py +210 -0
  42. tccli/services/cdz/v20221123/api.json +233 -0
  43. tccli/services/cdz/v20221123/examples.json +12 -0
  44. tccli/services/cfg/cfg_client.py +80 -32
  45. tccli/services/cfs/cfs_client.py +195 -78
  46. tccli/services/cfw/cfw_client.py +330 -132
  47. tccli/services/chdfs/chdfs_client.py +145 -58
  48. tccli/services/ciam/ciam_client.py +80 -32
  49. tccli/services/ckafka/ckafka_client.py +1149 -259
  50. tccli/services/ckafka/v20190819/api.json +3738 -1696
  51. tccli/services/ckafka/v20190819/examples.json +266 -162
  52. tccli/services/clb/clb_client.py +1054 -469
  53. tccli/services/clb/v20180317/api.json +2273 -1020
  54. tccli/services/clb/v20180317/examples.json +184 -124
  55. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  56. tccli/services/cls/cls_client.py +434 -173
  57. tccli/services/cmq/cmq_client.py +14 -803
  58. tccli/services/cmq/v20190304/api.json +173 -1367
  59. tccli/services/cmq/v20190304/examples.json +0 -120
  60. tccli/services/config/config_client.py +30 -12
  61. tccli/services/controlcenter/controlcenter_client.py +229 -2
  62. tccli/services/controlcenter/v20230110/api.json +528 -5
  63. tccli/services/controlcenter/v20230110/examples.json +32 -0
  64. tccli/services/csip/csip_client.py +170 -68
  65. tccli/services/ctsdb/ctsdb_client.py +10 -4
  66. tccli/services/cvm/cvm_client.py +706 -189
  67. tccli/services/cvm/v20170312/api.json +598 -185
  68. tccli/services/cvm/v20170312/examples.json +172 -126
  69. tccli/services/cwp/cwp_client.py +2325 -930
  70. tccli/services/cynosdb/cynosdb_client.py +1887 -577
  71. tccli/services/cynosdb/v20190107/api.json +11763 -7697
  72. tccli/services/cynosdb/v20190107/examples.json +132 -4
  73. tccli/services/dataintegration/dataintegration_client.py +5 -2
  74. tccli/services/dayu/dayu_client.py +515 -206
  75. tccli/services/dbbrain/dbbrain_client.py +210 -84
  76. tccli/services/dc/dc_client.py +90 -36
  77. tccli/services/dcdb/dcdb_client.py +310 -124
  78. tccli/services/dlc/dlc_client.py +859 -214
  79. tccli/services/dlc/v20210125/api.json +637 -13
  80. tccli/services/dlc/v20210125/examples.json +48 -0
  81. tccli/services/dms/dms_client.py +10 -4
  82. tccli/services/dnspod/dnspod_client.py +302 -76
  83. tccli/services/dnspod/v20210323/api.json +153 -0
  84. tccli/services/dnspod/v20210323/examples.json +16 -0
  85. tccli/services/domain/domain_client.py +120 -48
  86. tccli/services/dts/dts_client.py +415 -166
  87. tccli/services/eb/eb_client.py +130 -52
  88. tccli/services/ecdn/ecdn_client.py +75 -30
  89. tccli/services/ecm/ecm_client.py +620 -248
  90. tccli/services/eiam/eiam_client.py +200 -80
  91. tccli/services/emr/emr_client.py +2815 -146
  92. tccli/services/emr/v20190103/api.json +14527 -4841
  93. tccli/services/emr/v20190103/examples.json +404 -36
  94. tccli/services/es/es_client.py +105 -42
  95. tccli/services/facefusion/facefusion_client.py +15 -6
  96. tccli/services/faceid/faceid_client.py +95 -38
  97. tccli/services/faceid/v20180301/api.json +196 -53
  98. tccli/services/faceid/v20180301/examples.json +3 -3
  99. tccli/services/gaap/gaap_client.py +440 -176
  100. tccli/services/gme/gme_client.py +50 -20
  101. tccli/services/gpm/gpm_client.py +90 -36
  102. tccli/services/gse/gse_client.py +110 -44
  103. tccli/services/gwlb/gwlb_client.py +90 -36
  104. tccli/services/hunyuan/__init__.py +4 -0
  105. tccli/services/hunyuan/hunyuan_client.py +546 -0
  106. tccli/services/hunyuan/v20230901/api.json +628 -0
  107. tccli/services/hunyuan/v20230901/examples.json +60 -0
  108. tccli/services/iai/iai_client.py +145 -58
  109. tccli/services/iap/iap_client.py +30 -12
  110. tccli/services/ims/ims_client.py +5 -2
  111. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
  112. tccli/services/iotcloud/iotcloud_client.py +100 -40
  113. tccli/services/ip/ip_client.py +30 -12
  114. tccli/services/kms/kms_client.py +340 -136
  115. tccli/services/kms/v20190118/api.json +80 -3
  116. tccli/services/kms/v20190118/examples.json +3 -3
  117. tccli/services/lcic/lcic_client.py +265 -106
  118. tccli/services/lighthouse/lighthouse_client.py +730 -172
  119. tccli/services/lighthouse/v20200324/api.json +502 -14
  120. tccli/services/lighthouse/v20200324/examples.json +59 -5
  121. tccli/services/live/live_client.py +600 -240
  122. tccli/services/lke/lke_client.py +450 -180
  123. tccli/services/lkeap/__init__.py +4 -0
  124. tccli/services/lkeap/lkeap_client.py +602 -0
  125. tccli/services/lkeap/v20240522/api.json +989 -0
  126. tccli/services/lkeap/v20240522/examples.json +92 -0
  127. tccli/services/mariadb/mariadb_client.py +250 -100
  128. tccli/services/mdc/mdc_client.py +90 -36
  129. tccli/services/mdl/mdl_client.py +357 -90
  130. tccli/services/mdl/v20200326/api.json +1095 -77
  131. tccli/services/mdl/v20200326/examples.json +40 -16
  132. tccli/services/mdp/mdp_client.py +416 -124
  133. tccli/services/mdp/v20200527/api.json +335 -40
  134. tccli/services/mdp/v20200527/examples.json +95 -79
  135. tccli/services/message/__init__.py +4 -0
  136. tccli/services/message/message_client.py +210 -0
  137. tccli/services/message/v20181225/api.json +72 -0
  138. tccli/services/message/v20181225/examples.json +13 -0
  139. tccli/services/mongodb/mongodb_client.py +1404 -141
  140. tccli/services/mongodb/v20190725/api.json +2919 -677
  141. tccli/services/mongodb/v20190725/examples.json +190 -22
  142. tccli/services/monitor/monitor_client.py +1008 -296
  143. tccli/services/monitor/v20180724/api.json +664 -15
  144. tccli/services/monitor/v20180724/examples.json +152 -4
  145. tccli/services/mps/mps_client.py +1721 -381
  146. tccli/services/mps/v20190612/api.json +4905 -561
  147. tccli/services/mps/v20190612/examples.json +221 -69
  148. tccli/services/mqtt/__init__.py +4 -0
  149. tccli/services/mqtt/mqtt_client.py +1610 -0
  150. tccli/services/mqtt/v20240516/api.json +3057 -0
  151. tccli/services/mqtt/v20240516/examples.json +213 -0
  152. tccli/services/msp/msp_client.py +35 -14
  153. tccli/services/ocr/ocr_client.py +358 -76
  154. tccli/services/ocr/v20181119/api.json +731 -88
  155. tccli/services/ocr/v20181119/examples.json +40 -10
  156. tccli/services/omics/omics_client.py +100 -40
  157. tccli/services/organization/organization_client.py +580 -232
  158. tccli/services/postgres/postgres_client.py +455 -182
  159. tccli/services/privatedns/privatedns_client.py +155 -62
  160. tccli/services/pts/pts_client.py +240 -96
  161. tccli/services/quota/__init__.py +4 -0
  162. tccli/services/quota/quota_client.py +434 -0
  163. tccli/services/quota/v20241204/api.json +548 -0
  164. tccli/services/quota/v20241204/examples.json +51 -0
  165. tccli/services/rce/rce_client.py +5 -2
  166. tccli/services/redis/redis_client.py +545 -218
  167. tccli/services/redis/v20180412/api.json +227 -115
  168. tccli/services/redis/v20180412/examples.json +19 -19
  169. tccli/services/region/region_client.py +15 -6
  170. tccli/services/rum/rum_client.py +300 -120
  171. tccli/services/scf/scf_client.py +210 -84
  172. tccli/services/ses/ses_client.py +145 -58
  173. tccli/services/smh/__init__.py +4 -0
  174. tccli/services/smh/smh_client.py +714 -0
  175. tccli/services/smh/v20210712/api.json +1287 -0
  176. tccli/services/smh/v20210712/examples.json +85 -0
  177. tccli/services/sms/sms_client.py +90 -36
  178. tccli/services/sqlserver/sqlserver_client.py +3759 -480
  179. tccli/services/sqlserver/v20180328/api.json +8909 -2941
  180. tccli/services/sqlserver/v20180328/examples.json +447 -3
  181. tccli/services/ssl/ssl_client.py +190 -76
  182. tccli/services/ssm/ssm_client.py +120 -48
  183. tccli/services/sts/sts_client.py +25 -10
  184. tccli/services/tag/tag_client.py +150 -60
  185. tccli/services/tat/tat_client.py +95 -38
  186. tccli/services/tbaas/tbaas_client.py +20 -8
  187. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  188. tccli/services/tcaplusdb/v20190823/api.json +836 -760
  189. tccli/services/tcaplusdb/v20190823/examples.json +3 -3
  190. tccli/services/tchd/tchd_client.py +5 -2
  191. tccli/services/tcmpp/tcmpp_client.py +520 -208
  192. tccli/services/tcr/tcr_client.py +380 -152
  193. tccli/services/tcsas/tcsas_client.py +2576 -327
  194. tccli/services/tcsas/v20250106/api.json +8304 -3241
  195. tccli/services/tcsas/v20250106/examples.json +311 -15
  196. tccli/services/tcss/tcss_client.py +1650 -660
  197. tccli/services/tdid/tdid_client.py +240 -96
  198. tccli/services/tdmq/tdmq_client.py +2876 -466
  199. tccli/services/tdmq/v20200217/api.json +11607 -3958
  200. tccli/services/tdmq/v20200217/examples.json +562 -264
  201. tccli/services/tem/tem_client.py +280 -112
  202. tccli/services/teo/teo_client.py +1590 -540
  203. tccli/services/teo/v20220901/api.json +703 -71
  204. tccli/services/teo/v20220901/examples.json +88 -22
  205. tccli/services/tione/__init__.py +4 -0
  206. tccli/services/tione/tione_client.py +210 -0
  207. tccli/services/tione/v20211111/api.json +3074 -0
  208. tccli/services/tione/v20211111/examples.json +12 -0
  209. tccli/services/tiw/tiw_client.py +255 -102
  210. tccli/services/tke/tke_client.py +858 -276
  211. tccli/services/tke/v20180525/api.json +227 -0
  212. tccli/services/tke/v20180525/examples.json +24 -0
  213. tccli/services/tms/tms_client.py +5 -2
  214. tccli/services/tmt/tmt_client.py +5 -2
  215. tccli/services/trabbit/trabbit_client.py +145 -58
  216. tccli/services/trocket/__init__.py +4 -0
  217. tccli/services/trocket/trocket_client.py +2450 -0
  218. tccli/services/trocket/v20230308/api.json +6062 -0
  219. tccli/services/trocket/v20230308/examples.json +339 -0
  220. tccli/services/trro/trro_client.py +95 -38
  221. tccli/services/trtc/trtc_client.py +255 -102
  222. tccli/services/trtc/v20190722/api.json +135 -31
  223. tccli/services/trtc/v20190722/examples.json +7 -7
  224. tccli/services/tts/tts_client.py +5 -2
  225. tccli/services/vclm/vclm_client.py +10 -4
  226. tccli/services/vm/vm_client.py +20 -8
  227. tccli/services/vod/v20180717/api.json +2929 -296
  228. tccli/services/vod/v20180717/examples.json +40 -6
  229. tccli/services/vod/vod_client.py +1175 -358
  230. tccli/services/vpc/v20170312/api.json +1102 -137
  231. tccli/services/vpc/v20170312/examples.json +127 -23
  232. tccli/services/vpc/vpc_client.py +2241 -670
  233. tccli/services/waf/v20180125/api.json +1372 -194
  234. tccli/services/waf/v20180125/examples.json +89 -1
  235. tccli/services/waf/waf_client.py +1149 -245
  236. tccli/services/wedata/v20250806/api.json +13644 -0
  237. tccli/services/wedata/v20250806/examples.json +621 -0
  238. tccli/services/wedata/wedata_client.py +6067 -1263
  239. tccli/services/yunjing/yunjing_client.py +355 -142
  240. {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/METADATA +4 -7
  241. {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/RECORD +245 -203
  242. {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/WHEEL +1 -1
  243. {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/entry_points.txt +0 -1
  244. {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/LICENSE +0 -0
  245. {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,10 @@ def doDetachDisks(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doDetachDisks(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doDeleteBlueprints(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doDeleteBlueprints(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doCreateDisks(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doCreateDisks(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doDescribeAllScenes(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doDescribeAllScenes(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -225,7 +237,7 @@ def doDescribeAllScenes(args, parsed_globals):
225
237
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
238
 
227
239
 
228
- def doDescribeDiskDiscount(args, parsed_globals):
240
+ def doCancelShareBlueprintAcrossAccounts(args, parsed_globals):
229
241
  g_param = parse_global_arg(parsed_globals)
230
242
 
231
243
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -235,7 +247,10 @@ def doDescribeDiskDiscount(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,18 +262,18 @@ def doDescribeDiskDiscount(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
254
269
  client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
255
270
  client._sdkVersion += ("_CLI_" + __version__)
256
271
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.DescribeDiskDiscountRequest()
272
+ model = models.CancelShareBlueprintAcrossAccountsRequest()
258
273
  model.from_json_string(json.dumps(args))
259
274
  start_time = time.time()
260
275
  while True:
261
- rsp = client.DescribeDiskDiscount(model)
276
+ rsp = client.CancelShareBlueprintAcrossAccounts(model)
262
277
  result = rsp.to_json_string()
263
278
  try:
264
279
  json_obj = json.loads(result)
@@ -287,7 +302,10 @@ def doCreateFirewallRules(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doCreateFirewallRules(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doDescribeInstancesReturnable(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doDescribeInstancesReturnable(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -391,7 +412,10 @@ def doModifyInstancesAttribute(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,7 +427,7 @@ def doModifyInstancesAttribute(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +467,10 @@ def doDescribeZones(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,7 +482,7 @@ def doDescribeZones(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +522,10 @@ def doDescribeFirewallRulesTemplate(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,7 +537,7 @@ def doDescribeFirewallRulesTemplate(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +577,10 @@ def doCreateKeyPair(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,7 +592,7 @@ def doCreateKeyPair(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +632,10 @@ def doDescribeBundles(args, parsed_globals):
599
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
634
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
640
  else:
605
641
  cred = credential.Credential(
@@ -611,7 +647,7 @@ def doDescribeBundles(args, parsed_globals):
611
647
  endpoint=g_param[OptionsDefine.Endpoint],
612
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
649
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
651
  if g_param[OptionsDefine.Language]:
616
652
  profile.language = g_param[OptionsDefine.Language]
617
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +687,10 @@ def doDescribeInstancesDiskNum(args, parsed_globals):
651
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
689
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
695
  else:
657
696
  cred = credential.Credential(
@@ -663,7 +702,7 @@ def doDescribeInstancesDiskNum(args, parsed_globals):
663
702
  endpoint=g_param[OptionsDefine.Endpoint],
664
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
704
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
706
  if g_param[OptionsDefine.Language]:
668
707
  profile.language = g_param[OptionsDefine.Language]
669
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +742,10 @@ def doDeleteKeyPairs(args, parsed_globals):
703
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
744
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
750
  else:
709
751
  cred = credential.Credential(
@@ -715,7 +757,7 @@ def doDeleteKeyPairs(args, parsed_globals):
715
757
  endpoint=g_param[OptionsDefine.Endpoint],
716
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
759
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
761
  if g_param[OptionsDefine.Language]:
720
762
  profile.language = g_param[OptionsDefine.Language]
721
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +797,10 @@ def doModifyDisksRenewFlag(args, parsed_globals):
755
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
799
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
805
  else:
761
806
  cred = credential.Credential(
@@ -767,7 +812,7 @@ def doModifyDisksRenewFlag(args, parsed_globals):
767
812
  endpoint=g_param[OptionsDefine.Endpoint],
768
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
814
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
816
  if g_param[OptionsDefine.Language]:
772
817
  profile.language = g_param[OptionsDefine.Language]
773
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +852,10 @@ def doDescribeCcnAttachedInstances(args, parsed_globals):
807
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
854
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
860
  else:
813
861
  cred = credential.Credential(
@@ -819,7 +867,7 @@ def doDescribeCcnAttachedInstances(args, parsed_globals):
819
867
  endpoint=g_param[OptionsDefine.Endpoint],
820
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
869
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
871
  if g_param[OptionsDefine.Language]:
824
872
  profile.language = g_param[OptionsDefine.Language]
825
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +907,10 @@ def doDescribeInstances(args, parsed_globals):
859
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
909
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
915
  else:
865
916
  cred = credential.Credential(
@@ -871,7 +922,7 @@ def doDescribeInstances(args, parsed_globals):
871
922
  endpoint=g_param[OptionsDefine.Endpoint],
872
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
924
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
926
  if g_param[OptionsDefine.Language]:
876
927
  profile.language = g_param[OptionsDefine.Language]
877
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +962,10 @@ def doImportKeyPair(args, parsed_globals):
911
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
964
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
970
  else:
917
971
  cred = credential.Credential(
@@ -923,7 +977,7 @@ def doImportKeyPair(args, parsed_globals):
923
977
  endpoint=g_param[OptionsDefine.Endpoint],
924
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
979
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
981
  if g_param[OptionsDefine.Language]:
928
982
  profile.language = g_param[OptionsDefine.Language]
929
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -953,6 +1007,61 @@ def doImportKeyPair(args, parsed_globals):
953
1007
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
1008
 
955
1009
 
1010
+ def doDescribeImagesToShare(args, parsed_globals):
1011
+ g_param = parse_global_arg(parsed_globals)
1012
+
1013
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1014
+ cred = credential.CVMRoleCredential()
1015
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1016
+ cred = credential.STSAssumeRoleCredential(
1017
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
+ )
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1024
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1025
+ else:
1026
+ cred = credential.Credential(
1027
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1028
+ )
1029
+ http_profile = HttpProfile(
1030
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1031
+ reqMethod="POST",
1032
+ endpoint=g_param[OptionsDefine.Endpoint],
1033
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1034
+ )
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1036
+ if g_param[OptionsDefine.Language]:
1037
+ profile.language = g_param[OptionsDefine.Language]
1038
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1039
+ client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
1040
+ client._sdkVersion += ("_CLI_" + __version__)
1041
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1042
+ model = models.DescribeImagesToShareRequest()
1043
+ model.from_json_string(json.dumps(args))
1044
+ start_time = time.time()
1045
+ while True:
1046
+ rsp = client.DescribeImagesToShare(model)
1047
+ result = rsp.to_json_string()
1048
+ try:
1049
+ json_obj = json.loads(result)
1050
+ except TypeError as e:
1051
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1052
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1053
+ break
1054
+ cur_time = time.time()
1055
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1056
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1057
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1058
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1059
+ else:
1060
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1061
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1062
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1063
+
1064
+
956
1065
  def doDescribeInstancesTrafficPackages(args, parsed_globals):
957
1066
  g_param = parse_global_arg(parsed_globals)
958
1067
 
@@ -963,7 +1072,10 @@ def doDescribeInstancesTrafficPackages(args, parsed_globals):
963
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1074
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1080
  else:
969
1081
  cred = credential.Credential(
@@ -975,7 +1087,7 @@ def doDescribeInstancesTrafficPackages(args, parsed_globals):
975
1087
  endpoint=g_param[OptionsDefine.Endpoint],
976
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1089
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1091
  if g_param[OptionsDefine.Language]:
980
1092
  profile.language = g_param[OptionsDefine.Language]
981
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1015,7 +1127,10 @@ def doInquirePriceCreateBlueprint(args, parsed_globals):
1015
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1129
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1135
  else:
1021
1136
  cred = credential.Credential(
@@ -1027,7 +1142,7 @@ def doInquirePriceCreateBlueprint(args, parsed_globals):
1027
1142
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1144
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1146
  if g_param[OptionsDefine.Language]:
1032
1147
  profile.language = g_param[OptionsDefine.Language]
1033
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1067,7 +1182,10 @@ def doAttachDisks(args, parsed_globals):
1067
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1184
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1190
  else:
1073
1191
  cred = credential.Credential(
@@ -1079,7 +1197,7 @@ def doAttachDisks(args, parsed_globals):
1079
1197
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1199
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1201
  if g_param[OptionsDefine.Language]:
1084
1202
  profile.language = g_param[OptionsDefine.Language]
1085
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1119,7 +1237,10 @@ def doAssociateInstancesKeyPairs(args, parsed_globals):
1119
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1239
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1245
  else:
1125
1246
  cred = credential.Credential(
@@ -1131,7 +1252,7 @@ def doAssociateInstancesKeyPairs(args, parsed_globals):
1131
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1254
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1256
  if g_param[OptionsDefine.Language]:
1136
1257
  profile.language = g_param[OptionsDefine.Language]
1137
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1292,10 @@ def doDeleteFirewallRules(args, parsed_globals):
1171
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1294
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1300
  else:
1177
1301
  cred = credential.Credential(
@@ -1183,7 +1307,7 @@ def doDeleteFirewallRules(args, parsed_globals):
1183
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1309
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1311
  if g_param[OptionsDefine.Language]:
1188
1312
  profile.language = g_param[OptionsDefine.Language]
1189
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1347,10 @@ def doDisassociateInstancesKeyPairs(args, parsed_globals):
1223
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1349
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1355
  else:
1229
1356
  cred = credential.Credential(
@@ -1235,7 +1362,7 @@ def doDisassociateInstancesKeyPairs(args, parsed_globals):
1235
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1364
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1366
  if g_param[OptionsDefine.Language]:
1240
1367
  profile.language = g_param[OptionsDefine.Language]
1241
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1275,7 +1402,10 @@ def doDescribeBundleDiscount(args, parsed_globals):
1275
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1404
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1410
  else:
1281
1411
  cred = credential.Credential(
@@ -1287,7 +1417,7 @@ def doDescribeBundleDiscount(args, parsed_globals):
1287
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1419
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1421
  if g_param[OptionsDefine.Language]:
1292
1422
  profile.language = g_param[OptionsDefine.Language]
1293
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1317,6 +1447,61 @@ def doDescribeBundleDiscount(args, parsed_globals):
1317
1447
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
1448
 
1319
1449
 
1450
+ def doCreateInstances(args, parsed_globals):
1451
+ g_param = parse_global_arg(parsed_globals)
1452
+
1453
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1454
+ cred = credential.CVMRoleCredential()
1455
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1456
+ cred = credential.STSAssumeRoleCredential(
1457
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1458
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1459
+ )
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1464
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1465
+ else:
1466
+ cred = credential.Credential(
1467
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1468
+ )
1469
+ http_profile = HttpProfile(
1470
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1471
+ reqMethod="POST",
1472
+ endpoint=g_param[OptionsDefine.Endpoint],
1473
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1474
+ )
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1476
+ if g_param[OptionsDefine.Language]:
1477
+ profile.language = g_param[OptionsDefine.Language]
1478
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1479
+ client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
1480
+ client._sdkVersion += ("_CLI_" + __version__)
1481
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1482
+ model = models.CreateInstancesRequest()
1483
+ model.from_json_string(json.dumps(args))
1484
+ start_time = time.time()
1485
+ while True:
1486
+ rsp = client.CreateInstances(model)
1487
+ result = rsp.to_json_string()
1488
+ try:
1489
+ json_obj = json.loads(result)
1490
+ except TypeError as e:
1491
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1492
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1493
+ break
1494
+ cur_time = time.time()
1495
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1496
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1497
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1498
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1499
+ else:
1500
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1501
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1502
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1503
+
1504
+
1320
1505
  def doAttachCcn(args, parsed_globals):
1321
1506
  g_param = parse_global_arg(parsed_globals)
1322
1507
 
@@ -1327,7 +1512,10 @@ def doAttachCcn(args, parsed_globals):
1327
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1514
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1520
  else:
1333
1521
  cred = credential.Credential(
@@ -1339,7 +1527,7 @@ def doAttachCcn(args, parsed_globals):
1339
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1529
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1531
  if g_param[OptionsDefine.Language]:
1344
1532
  profile.language = g_param[OptionsDefine.Language]
1345
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1379,7 +1567,10 @@ def doDescribeBlueprints(args, parsed_globals):
1379
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1569
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1575
  else:
1385
1576
  cred = credential.Credential(
@@ -1391,7 +1582,7 @@ def doDescribeBlueprints(args, parsed_globals):
1391
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1584
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1586
  if g_param[OptionsDefine.Language]:
1396
1587
  profile.language = g_param[OptionsDefine.Language]
1397
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1431,7 +1622,10 @@ def doResetInstancesPassword(args, parsed_globals):
1431
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1624
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1630
  else:
1437
1631
  cred = credential.Credential(
@@ -1443,7 +1637,7 @@ def doResetInstancesPassword(args, parsed_globals):
1443
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1639
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1641
  if g_param[OptionsDefine.Language]:
1448
1642
  profile.language = g_param[OptionsDefine.Language]
1449
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1483,7 +1677,10 @@ def doModifyInstancesRenewFlag(args, parsed_globals):
1483
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1679
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1685
  else:
1489
1686
  cred = credential.Credential(
@@ -1495,7 +1692,7 @@ def doModifyInstancesRenewFlag(args, parsed_globals):
1495
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1694
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1696
  if g_param[OptionsDefine.Language]:
1500
1697
  profile.language = g_param[OptionsDefine.Language]
1501
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1535,7 +1732,10 @@ def doDescribeDisksDeniedActions(args, parsed_globals):
1535
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1734
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1740
  else:
1541
1741
  cred = credential.Credential(
@@ -1547,7 +1747,7 @@ def doDescribeDisksDeniedActions(args, parsed_globals):
1547
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1749
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1751
  if g_param[OptionsDefine.Language]:
1552
1752
  profile.language = g_param[OptionsDefine.Language]
1553
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1577,6 +1777,61 @@ def doDescribeDisksDeniedActions(args, parsed_globals):
1577
1777
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1578
1778
 
1579
1779
 
1780
+ def doRenewInstances(args, parsed_globals):
1781
+ g_param = parse_global_arg(parsed_globals)
1782
+
1783
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1784
+ cred = credential.CVMRoleCredential()
1785
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1786
+ cred = credential.STSAssumeRoleCredential(
1787
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1788
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1789
+ )
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1794
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1795
+ else:
1796
+ cred = credential.Credential(
1797
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1798
+ )
1799
+ http_profile = HttpProfile(
1800
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1801
+ reqMethod="POST",
1802
+ endpoint=g_param[OptionsDefine.Endpoint],
1803
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1804
+ )
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1806
+ if g_param[OptionsDefine.Language]:
1807
+ profile.language = g_param[OptionsDefine.Language]
1808
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1809
+ client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
1810
+ client._sdkVersion += ("_CLI_" + __version__)
1811
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1812
+ model = models.RenewInstancesRequest()
1813
+ model.from_json_string(json.dumps(args))
1814
+ start_time = time.time()
1815
+ while True:
1816
+ rsp = client.RenewInstances(model)
1817
+ result = rsp.to_json_string()
1818
+ try:
1819
+ json_obj = json.loads(result)
1820
+ except TypeError as e:
1821
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1822
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1823
+ break
1824
+ cur_time = time.time()
1825
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1826
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1827
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1828
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1829
+ else:
1830
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1831
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1832
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1833
+
1834
+
1580
1835
  def doDescribeModifyInstanceBundles(args, parsed_globals):
1581
1836
  g_param = parse_global_arg(parsed_globals)
1582
1837
 
@@ -1587,7 +1842,10 @@ def doDescribeModifyInstanceBundles(args, parsed_globals):
1587
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1844
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1850
  else:
1593
1851
  cred = credential.Credential(
@@ -1599,7 +1857,7 @@ def doDescribeModifyInstanceBundles(args, parsed_globals):
1599
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1859
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1861
  if g_param[OptionsDefine.Language]:
1604
1862
  profile.language = g_param[OptionsDefine.Language]
1605
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +1897,10 @@ def doDescribeDisks(args, parsed_globals):
1639
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1899
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1905
  else:
1645
1906
  cred = credential.Credential(
@@ -1651,7 +1912,7 @@ def doDescribeDisks(args, parsed_globals):
1651
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1914
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1916
  if g_param[OptionsDefine.Language]:
1656
1917
  profile.language = g_param[OptionsDefine.Language]
1657
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +1952,10 @@ def doDescribeGeneralResourceQuotas(args, parsed_globals):
1691
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1954
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1960
  else:
1697
1961
  cred = credential.Credential(
@@ -1703,7 +1967,7 @@ def doDescribeGeneralResourceQuotas(args, parsed_globals):
1703
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1704
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
1969
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
1971
  if g_param[OptionsDefine.Language]:
1708
1972
  profile.language = g_param[OptionsDefine.Language]
1709
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +2007,10 @@ def doModifyBlueprintAttribute(args, parsed_globals):
1743
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
2009
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
2015
  else:
1749
2016
  cred = credential.Credential(
@@ -1755,7 +2022,7 @@ def doModifyBlueprintAttribute(args, parsed_globals):
1755
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1756
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
2024
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
2026
  if g_param[OptionsDefine.Language]:
1760
2027
  profile.language = g_param[OptionsDefine.Language]
1761
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1795,7 +2062,10 @@ def doDescribeInstancesDeniedActions(args, parsed_globals):
1795
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
2064
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
2070
  else:
1801
2071
  cred = credential.Credential(
@@ -1807,7 +2077,7 @@ def doDescribeInstancesDeniedActions(args, parsed_globals):
1807
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1808
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
2079
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
2081
  if g_param[OptionsDefine.Language]:
1812
2082
  profile.language = g_param[OptionsDefine.Language]
1813
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1847,7 +2117,10 @@ def doInquirePriceRenewInstances(args, parsed_globals):
1847
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2119
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2125
  else:
1853
2126
  cred = credential.Credential(
@@ -1859,7 +2132,7 @@ def doInquirePriceRenewInstances(args, parsed_globals):
1859
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2134
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2136
  if g_param[OptionsDefine.Language]:
1864
2137
  profile.language = g_param[OptionsDefine.Language]
1865
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1899,7 +2172,10 @@ def doDeleteSnapshots(args, parsed_globals):
1899
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2174
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2180
  else:
1905
2181
  cred = credential.Credential(
@@ -1911,7 +2187,7 @@ def doDeleteSnapshots(args, parsed_globals):
1911
2187
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2189
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2191
  if g_param[OptionsDefine.Language]:
1916
2192
  profile.language = g_param[OptionsDefine.Language]
1917
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1951,7 +2227,10 @@ def doInquirePriceCreateInstances(args, parsed_globals):
1951
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2229
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2235
  else:
1957
2236
  cred = credential.Credential(
@@ -1963,7 +2242,7 @@ def doInquirePriceCreateInstances(args, parsed_globals):
1963
2242
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2244
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2246
  if g_param[OptionsDefine.Language]:
1968
2247
  profile.language = g_param[OptionsDefine.Language]
1969
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2003,7 +2282,10 @@ def doDescribeInstanceLoginKeyPairAttribute(args, parsed_globals):
2003
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2284
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2290
  else:
2009
2291
  cred = credential.Credential(
@@ -2015,7 +2297,7 @@ def doDescribeInstanceLoginKeyPairAttribute(args, parsed_globals):
2015
2297
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2299
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2301
  if g_param[OptionsDefine.Language]:
2020
2302
  profile.language = g_param[OptionsDefine.Language]
2021
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2055,7 +2337,10 @@ def doModifyDisksAttribute(args, parsed_globals):
2055
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2339
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2345
  else:
2061
2346
  cred = credential.Credential(
@@ -2067,7 +2352,7 @@ def doModifyDisksAttribute(args, parsed_globals):
2067
2352
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2354
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2356
  if g_param[OptionsDefine.Language]:
2072
2357
  profile.language = g_param[OptionsDefine.Language]
2073
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2107,7 +2392,10 @@ def doStopInstances(args, parsed_globals):
2107
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2394
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2400
  else:
2113
2401
  cred = credential.Credential(
@@ -2119,7 +2407,7 @@ def doStopInstances(args, parsed_globals):
2119
2407
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2409
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2411
  if g_param[OptionsDefine.Language]:
2124
2412
  profile.language = g_param[OptionsDefine.Language]
2125
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2159,7 +2447,10 @@ def doModifyInstancesLoginKeyPairAttribute(args, parsed_globals):
2159
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2449
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2455
  else:
2165
2456
  cred = credential.Credential(
@@ -2171,7 +2462,7 @@ def doModifyInstancesLoginKeyPairAttribute(args, parsed_globals):
2171
2462
  endpoint=g_param[OptionsDefine.Endpoint],
2172
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
2464
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
2466
  if g_param[OptionsDefine.Language]:
2176
2467
  profile.language = g_param[OptionsDefine.Language]
2177
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2211,7 +2502,10 @@ def doDescribeRegions(args, parsed_globals):
2211
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2504
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2510
  else:
2217
2511
  cred = credential.Credential(
@@ -2223,7 +2517,7 @@ def doDescribeRegions(args, parsed_globals):
2223
2517
  endpoint=g_param[OptionsDefine.Endpoint],
2224
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
2519
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
2521
  if g_param[OptionsDefine.Language]:
2228
2522
  profile.language = g_param[OptionsDefine.Language]
2229
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2263,7 +2557,10 @@ def doDescribeDisksReturnable(args, parsed_globals):
2263
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
2559
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
2565
  else:
2269
2566
  cred = credential.Credential(
@@ -2275,7 +2572,7 @@ def doDescribeDisksReturnable(args, parsed_globals):
2275
2572
  endpoint=g_param[OptionsDefine.Endpoint],
2276
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
2574
  )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2279
2576
  if g_param[OptionsDefine.Language]:
2280
2577
  profile.language = g_param[OptionsDefine.Language]
2281
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2315,7 +2612,10 @@ def doInquirePriceRenewDisks(args, parsed_globals):
2315
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
2614
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
2620
  else:
2321
2621
  cred = credential.Credential(
@@ -2327,7 +2627,7 @@ def doInquirePriceRenewDisks(args, parsed_globals):
2327
2627
  endpoint=g_param[OptionsDefine.Endpoint],
2328
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
2629
  )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2331
2631
  if g_param[OptionsDefine.Language]:
2332
2632
  profile.language = g_param[OptionsDefine.Language]
2333
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2367,7 +2667,10 @@ def doDescribeBlueprintInstances(args, parsed_globals):
2367
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
2669
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
2675
  else:
2373
2676
  cred = credential.Credential(
@@ -2379,7 +2682,7 @@ def doDescribeBlueprintInstances(args, parsed_globals):
2379
2682
  endpoint=g_param[OptionsDefine.Endpoint],
2380
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
2684
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
2686
  if g_param[OptionsDefine.Language]:
2384
2687
  profile.language = g_param[OptionsDefine.Language]
2385
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2419,7 +2722,10 @@ def doResetInstance(args, parsed_globals):
2419
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
2724
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
2730
  else:
2425
2731
  cred = credential.Credential(
@@ -2431,7 +2737,7 @@ def doResetInstance(args, parsed_globals):
2431
2737
  endpoint=g_param[OptionsDefine.Endpoint],
2432
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
2739
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
2741
  if g_param[OptionsDefine.Language]:
2436
2742
  profile.language = g_param[OptionsDefine.Language]
2437
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2471,7 +2777,10 @@ def doApplyInstanceSnapshot(args, parsed_globals):
2471
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
2779
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
2785
  else:
2477
2786
  cred = credential.Credential(
@@ -2483,7 +2792,7 @@ def doApplyInstanceSnapshot(args, parsed_globals):
2483
2792
  endpoint=g_param[OptionsDefine.Endpoint],
2484
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
2794
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
2796
  if g_param[OptionsDefine.Language]:
2488
2797
  profile.language = g_param[OptionsDefine.Language]
2489
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2523,7 +2832,10 @@ def doDetachCcn(args, parsed_globals):
2523
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
2834
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
2840
  else:
2529
2841
  cred = credential.Credential(
@@ -2535,7 +2847,7 @@ def doDetachCcn(args, parsed_globals):
2535
2847
  endpoint=g_param[OptionsDefine.Endpoint],
2536
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
2849
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
2851
  if g_param[OptionsDefine.Language]:
2540
2852
  profile.language = g_param[OptionsDefine.Language]
2541
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2575,7 +2887,10 @@ def doDescribeSnapshots(args, parsed_globals):
2575
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
2889
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
2895
  else:
2581
2896
  cred = credential.Credential(
@@ -2587,7 +2902,7 @@ def doDescribeSnapshots(args, parsed_globals):
2587
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2588
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
2904
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
2906
  if g_param[OptionsDefine.Language]:
2592
2907
  profile.language = g_param[OptionsDefine.Language]
2593
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2627,7 +2942,10 @@ def doModifyFirewallRules(args, parsed_globals):
2627
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
2944
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
2950
  else:
2633
2951
  cred = credential.Credential(
@@ -2639,7 +2957,7 @@ def doModifyFirewallRules(args, parsed_globals):
2639
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2640
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
2959
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
2961
  if g_param[OptionsDefine.Language]:
2644
2962
  profile.language = g_param[OptionsDefine.Language]
2645
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2679,7 +2997,10 @@ def doTerminateInstances(args, parsed_globals):
2679
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
2999
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
3005
  else:
2685
3006
  cred = credential.Credential(
@@ -2691,7 +3012,7 @@ def doTerminateInstances(args, parsed_globals):
2691
3012
  endpoint=g_param[OptionsDefine.Endpoint],
2692
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
3014
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
3016
  if g_param[OptionsDefine.Language]:
2696
3017
  profile.language = g_param[OptionsDefine.Language]
2697
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2721,7 +3042,7 @@ def doTerminateInstances(args, parsed_globals):
2721
3042
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2722
3043
 
2723
3044
 
2724
- def doRenewInstances(args, parsed_globals):
3045
+ def doSyncBlueprint(args, parsed_globals):
2725
3046
  g_param = parse_global_arg(parsed_globals)
2726
3047
 
2727
3048
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2731,7 +3052,10 @@ def doRenewInstances(args, parsed_globals):
2731
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
3054
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
3060
  else:
2737
3061
  cred = credential.Credential(
@@ -2743,18 +3067,18 @@ def doRenewInstances(args, parsed_globals):
2743
3067
  endpoint=g_param[OptionsDefine.Endpoint],
2744
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
3069
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
3071
  if g_param[OptionsDefine.Language]:
2748
3072
  profile.language = g_param[OptionsDefine.Language]
2749
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2750
3074
  client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
2751
3075
  client._sdkVersion += ("_CLI_" + __version__)
2752
3076
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2753
- model = models.RenewInstancesRequest()
3077
+ model = models.SyncBlueprintRequest()
2754
3078
  model.from_json_string(json.dumps(args))
2755
3079
  start_time = time.time()
2756
3080
  while True:
2757
- rsp = client.RenewInstances(model)
3081
+ rsp = client.SyncBlueprint(model)
2758
3082
  result = rsp.to_json_string()
2759
3083
  try:
2760
3084
  json_obj = json.loads(result)
@@ -2783,7 +3107,10 @@ def doTerminateDisks(args, parsed_globals):
2783
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
3109
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
3115
  else:
2789
3116
  cred = credential.Credential(
@@ -2795,7 +3122,7 @@ def doTerminateDisks(args, parsed_globals):
2795
3122
  endpoint=g_param[OptionsDefine.Endpoint],
2796
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
3124
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
3126
  if g_param[OptionsDefine.Language]:
2800
3127
  profile.language = g_param[OptionsDefine.Language]
2801
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2835,7 +3162,10 @@ def doDescribeInstanceVncUrl(args, parsed_globals):
2835
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2836
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2837
3164
  )
2838
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
3170
  else:
2841
3171
  cred = credential.Credential(
@@ -2847,7 +3177,7 @@ def doDescribeInstanceVncUrl(args, parsed_globals):
2847
3177
  endpoint=g_param[OptionsDefine.Endpoint],
2848
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2849
3179
  )
2850
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2851
3181
  if g_param[OptionsDefine.Language]:
2852
3182
  profile.language = g_param[OptionsDefine.Language]
2853
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2887,7 +3217,10 @@ def doModifySnapshotAttribute(args, parsed_globals):
2887
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2888
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2889
3219
  )
2890
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2891
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2892
3225
  else:
2893
3226
  cred = credential.Credential(
@@ -2899,7 +3232,7 @@ def doModifySnapshotAttribute(args, parsed_globals):
2899
3232
  endpoint=g_param[OptionsDefine.Endpoint],
2900
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2901
3234
  )
2902
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2903
3236
  if g_param[OptionsDefine.Language]:
2904
3237
  profile.language = g_param[OptionsDefine.Language]
2905
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2939,7 +3272,10 @@ def doDescribeFirewallRules(args, parsed_globals):
2939
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2940
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2941
3274
  )
2942
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2943
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2944
3280
  else:
2945
3281
  cred = credential.Credential(
@@ -2951,7 +3287,7 @@ def doDescribeFirewallRules(args, parsed_globals):
2951
3287
  endpoint=g_param[OptionsDefine.Endpoint],
2952
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2953
3289
  )
2954
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2955
3291
  if g_param[OptionsDefine.Language]:
2956
3292
  profile.language = g_param[OptionsDefine.Language]
2957
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2991,7 +3327,10 @@ def doStartInstances(args, parsed_globals):
2991
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2992
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2993
3329
  )
2994
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2995
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2996
3335
  else:
2997
3336
  cred = credential.Credential(
@@ -3003,7 +3342,7 @@ def doStartInstances(args, parsed_globals):
3003
3342
  endpoint=g_param[OptionsDefine.Endpoint],
3004
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3005
3344
  )
3006
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3007
3346
  if g_param[OptionsDefine.Language]:
3008
3347
  profile.language = g_param[OptionsDefine.Language]
3009
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3043,7 +3382,10 @@ def doDescribeKeyPairs(args, parsed_globals):
3043
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3044
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3045
3384
  )
3046
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3047
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3048
3390
  else:
3049
3391
  cred = credential.Credential(
@@ -3055,7 +3397,7 @@ def doDescribeKeyPairs(args, parsed_globals):
3055
3397
  endpoint=g_param[OptionsDefine.Endpoint],
3056
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3057
3399
  )
3058
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3059
3401
  if g_param[OptionsDefine.Language]:
3060
3402
  profile.language = g_param[OptionsDefine.Language]
3061
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3095,7 +3437,10 @@ def doDescribeResetInstanceBlueprints(args, parsed_globals):
3095
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
3439
  )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
3445
  else:
3101
3446
  cred = credential.Credential(
@@ -3107,7 +3452,7 @@ def doDescribeResetInstanceBlueprints(args, parsed_globals):
3107
3452
  endpoint=g_param[OptionsDefine.Endpoint],
3108
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3109
3454
  )
3110
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3111
3456
  if g_param[OptionsDefine.Language]:
3112
3457
  profile.language = g_param[OptionsDefine.Language]
3113
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3147,7 +3492,10 @@ def doInquirePriceCreateDisks(args, parsed_globals):
3147
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3148
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3149
3494
  )
3150
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3151
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3152
3500
  else:
3153
3501
  cred = credential.Credential(
@@ -3159,7 +3507,7 @@ def doInquirePriceCreateDisks(args, parsed_globals):
3159
3507
  endpoint=g_param[OptionsDefine.Endpoint],
3160
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3161
3509
  )
3162
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3163
3511
  if g_param[OptionsDefine.Language]:
3164
3512
  profile.language = g_param[OptionsDefine.Language]
3165
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3199,7 +3547,10 @@ def doDescribeScenes(args, parsed_globals):
3199
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3200
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3201
3549
  )
3202
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3203
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3204
3555
  else:
3205
3556
  cred = credential.Credential(
@@ -3211,7 +3562,7 @@ def doDescribeScenes(args, parsed_globals):
3211
3562
  endpoint=g_param[OptionsDefine.Endpoint],
3212
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3213
3564
  )
3214
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3215
3566
  if g_param[OptionsDefine.Language]:
3216
3567
  profile.language = g_param[OptionsDefine.Language]
3217
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3251,7 +3602,10 @@ def doIsolateDisks(args, parsed_globals):
3251
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
3604
  )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
3610
  else:
3257
3611
  cred = credential.Credential(
@@ -3263,7 +3617,7 @@ def doIsolateDisks(args, parsed_globals):
3263
3617
  endpoint=g_param[OptionsDefine.Endpoint],
3264
3618
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3265
3619
  )
3266
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3620
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3267
3621
  if g_param[OptionsDefine.Language]:
3268
3622
  profile.language = g_param[OptionsDefine.Language]
3269
3623
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3303,7 +3657,10 @@ def doIsolateInstances(args, parsed_globals):
3303
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3304
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3305
3659
  )
3306
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3307
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3308
3665
  else:
3309
3666
  cred = credential.Credential(
@@ -3315,7 +3672,7 @@ def doIsolateInstances(args, parsed_globals):
3315
3672
  endpoint=g_param[OptionsDefine.Endpoint],
3316
3673
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3317
3674
  )
3318
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3675
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3319
3676
  if g_param[OptionsDefine.Language]:
3320
3677
  profile.language = g_param[OptionsDefine.Language]
3321
3678
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3355,7 +3712,10 @@ def doDescribeDiskConfigs(args, parsed_globals):
3355
3712
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3356
3713
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3357
3714
  )
3358
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3715
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3716
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3717
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3359
3719
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3360
3720
  else:
3361
3721
  cred = credential.Credential(
@@ -3367,7 +3727,7 @@ def doDescribeDiskConfigs(args, parsed_globals):
3367
3727
  endpoint=g_param[OptionsDefine.Endpoint],
3368
3728
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3369
3729
  )
3370
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3730
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3371
3731
  if g_param[OptionsDefine.Language]:
3372
3732
  profile.language = g_param[OptionsDefine.Language]
3373
3733
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3407,7 +3767,10 @@ def doModifyFirewallRuleDescription(args, parsed_globals):
3407
3767
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3408
3768
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3409
3769
  )
3410
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3770
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3771
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3772
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3411
3774
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3412
3775
  else:
3413
3776
  cred = credential.Credential(
@@ -3419,7 +3782,7 @@ def doModifyFirewallRuleDescription(args, parsed_globals):
3419
3782
  endpoint=g_param[OptionsDefine.Endpoint],
3420
3783
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3421
3784
  )
3422
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3785
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3423
3786
  if g_param[OptionsDefine.Language]:
3424
3787
  profile.language = g_param[OptionsDefine.Language]
3425
3788
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3449,7 +3812,7 @@ def doModifyFirewallRuleDescription(args, parsed_globals):
3449
3812
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3450
3813
 
3451
3814
 
3452
- def doResetAttachCcn(args, parsed_globals):
3815
+ def doDescribeDiskDiscount(args, parsed_globals):
3453
3816
  g_param = parse_global_arg(parsed_globals)
3454
3817
 
3455
3818
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3459,7 +3822,10 @@ def doResetAttachCcn(args, parsed_globals):
3459
3822
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3460
3823
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3461
3824
  )
3462
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3825
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3826
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3827
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3463
3829
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3464
3830
  else:
3465
3831
  cred = credential.Credential(
@@ -3471,18 +3837,18 @@ def doResetAttachCcn(args, parsed_globals):
3471
3837
  endpoint=g_param[OptionsDefine.Endpoint],
3472
3838
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3473
3839
  )
3474
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3840
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3475
3841
  if g_param[OptionsDefine.Language]:
3476
3842
  profile.language = g_param[OptionsDefine.Language]
3477
3843
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3478
3844
  client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
3479
3845
  client._sdkVersion += ("_CLI_" + __version__)
3480
3846
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3481
- model = models.ResetAttachCcnRequest()
3847
+ model = models.DescribeDiskDiscountRequest()
3482
3848
  model.from_json_string(json.dumps(args))
3483
3849
  start_time = time.time()
3484
3850
  while True:
3485
- rsp = client.ResetAttachCcn(model)
3851
+ rsp = client.DescribeDiskDiscount(model)
3486
3852
  result = rsp.to_json_string()
3487
3853
  try:
3488
3854
  json_obj = json.loads(result)
@@ -3511,7 +3877,10 @@ def doRebootInstances(args, parsed_globals):
3511
3877
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3512
3878
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3513
3879
  )
3514
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3880
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3881
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3882
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3515
3884
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3516
3885
  else:
3517
3886
  cred = credential.Credential(
@@ -3523,7 +3892,7 @@ def doRebootInstances(args, parsed_globals):
3523
3892
  endpoint=g_param[OptionsDefine.Endpoint],
3524
3893
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3525
3894
  )
3526
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3895
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3527
3896
  if g_param[OptionsDefine.Language]:
3528
3897
  profile.language = g_param[OptionsDefine.Language]
3529
3898
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3553,7 +3922,7 @@ def doRebootInstances(args, parsed_globals):
3553
3922
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3554
3923
 
3555
3924
 
3556
- def doCreateInstances(args, parsed_globals):
3925
+ def doCreateInstanceSnapshot(args, parsed_globals):
3557
3926
  g_param = parse_global_arg(parsed_globals)
3558
3927
 
3559
3928
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3563,7 +3932,10 @@ def doCreateInstances(args, parsed_globals):
3563
3932
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3564
3933
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3565
3934
  )
3566
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3935
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3936
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3937
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3567
3939
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3568
3940
  else:
3569
3941
  cred = credential.Credential(
@@ -3575,18 +3947,73 @@ def doCreateInstances(args, parsed_globals):
3575
3947
  endpoint=g_param[OptionsDefine.Endpoint],
3576
3948
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3577
3949
  )
3578
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3950
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3579
3951
  if g_param[OptionsDefine.Language]:
3580
3952
  profile.language = g_param[OptionsDefine.Language]
3581
3953
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3582
3954
  client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
3583
3955
  client._sdkVersion += ("_CLI_" + __version__)
3584
3956
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3585
- model = models.CreateInstancesRequest()
3957
+ model = models.CreateInstanceSnapshotRequest()
3586
3958
  model.from_json_string(json.dumps(args))
3587
3959
  start_time = time.time()
3588
3960
  while True:
3589
- rsp = client.CreateInstances(model)
3961
+ rsp = client.CreateInstanceSnapshot(model)
3962
+ result = rsp.to_json_string()
3963
+ try:
3964
+ json_obj = json.loads(result)
3965
+ except TypeError as e:
3966
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3967
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3968
+ break
3969
+ cur_time = time.time()
3970
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3971
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3972
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3973
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3974
+ else:
3975
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3976
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3977
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3978
+
3979
+
3980
+ def doModifyImageSharePermission(args, parsed_globals):
3981
+ g_param = parse_global_arg(parsed_globals)
3982
+
3983
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3984
+ cred = credential.CVMRoleCredential()
3985
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3986
+ cred = credential.STSAssumeRoleCredential(
3987
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3988
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3989
+ )
3990
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3991
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3992
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3994
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3995
+ else:
3996
+ cred = credential.Credential(
3997
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3998
+ )
3999
+ http_profile = HttpProfile(
4000
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4001
+ reqMethod="POST",
4002
+ endpoint=g_param[OptionsDefine.Endpoint],
4003
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4004
+ )
4005
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4006
+ if g_param[OptionsDefine.Language]:
4007
+ profile.language = g_param[OptionsDefine.Language]
4008
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4009
+ client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
4010
+ client._sdkVersion += ("_CLI_" + __version__)
4011
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4012
+ model = models.ModifyImageSharePermissionRequest()
4013
+ model.from_json_string(json.dumps(args))
4014
+ start_time = time.time()
4015
+ while True:
4016
+ rsp = client.ModifyImageSharePermission(model)
3590
4017
  result = rsp.to_json_string()
3591
4018
  try:
3592
4019
  json_obj = json.loads(result)
@@ -3615,7 +4042,10 @@ def doRenewDisks(args, parsed_globals):
3615
4042
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3616
4043
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3617
4044
  )
3618
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4045
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4046
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4047
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3619
4049
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3620
4050
  else:
3621
4051
  cred = credential.Credential(
@@ -3627,7 +4057,7 @@ def doRenewDisks(args, parsed_globals):
3627
4057
  endpoint=g_param[OptionsDefine.Endpoint],
3628
4058
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3629
4059
  )
3630
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4060
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3631
4061
  if g_param[OptionsDefine.Language]:
3632
4062
  profile.language = g_param[OptionsDefine.Language]
3633
4063
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3657,6 +4087,61 @@ def doRenewDisks(args, parsed_globals):
3657
4087
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3658
4088
 
3659
4089
 
4090
+ def doDescribeSnapshotsDeniedActions(args, parsed_globals):
4091
+ g_param = parse_global_arg(parsed_globals)
4092
+
4093
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4094
+ cred = credential.CVMRoleCredential()
4095
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4096
+ cred = credential.STSAssumeRoleCredential(
4097
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4098
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4099
+ )
4100
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4101
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4102
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4104
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4105
+ else:
4106
+ cred = credential.Credential(
4107
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4108
+ )
4109
+ http_profile = HttpProfile(
4110
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4111
+ reqMethod="POST",
4112
+ endpoint=g_param[OptionsDefine.Endpoint],
4113
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4114
+ )
4115
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4116
+ if g_param[OptionsDefine.Language]:
4117
+ profile.language = g_param[OptionsDefine.Language]
4118
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4119
+ client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
4120
+ client._sdkVersion += ("_CLI_" + __version__)
4121
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4122
+ model = models.DescribeSnapshotsDeniedActionsRequest()
4123
+ model.from_json_string(json.dumps(args))
4124
+ start_time = time.time()
4125
+ while True:
4126
+ rsp = client.DescribeSnapshotsDeniedActions(model)
4127
+ result = rsp.to_json_string()
4128
+ try:
4129
+ json_obj = json.loads(result)
4130
+ except TypeError as e:
4131
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4132
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4133
+ break
4134
+ cur_time = time.time()
4135
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4136
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4137
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4138
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4139
+ else:
4140
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4141
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4142
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4143
+
4144
+
3660
4145
  def doCreateBlueprint(args, parsed_globals):
3661
4146
  g_param = parse_global_arg(parsed_globals)
3662
4147
 
@@ -3667,7 +4152,10 @@ def doCreateBlueprint(args, parsed_globals):
3667
4152
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
4153
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
4154
  )
3670
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4155
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4156
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4157
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
4159
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
4160
  else:
3673
4161
  cred = credential.Credential(
@@ -3679,7 +4167,7 @@ def doCreateBlueprint(args, parsed_globals):
3679
4167
  endpoint=g_param[OptionsDefine.Endpoint],
3680
4168
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3681
4169
  )
3682
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4170
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3683
4171
  if g_param[OptionsDefine.Language]:
3684
4172
  profile.language = g_param[OptionsDefine.Language]
3685
4173
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3709,7 +4197,7 @@ def doCreateBlueprint(args, parsed_globals):
3709
4197
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3710
4198
 
3711
4199
 
3712
- def doDescribeSnapshotsDeniedActions(args, parsed_globals):
4200
+ def doShareBlueprintAcrossAccounts(args, parsed_globals):
3713
4201
  g_param = parse_global_arg(parsed_globals)
3714
4202
 
3715
4203
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3719,7 +4207,10 @@ def doDescribeSnapshotsDeniedActions(args, parsed_globals):
3719
4207
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3720
4208
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3721
4209
  )
3722
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4210
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4211
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4212
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3723
4214
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3724
4215
  else:
3725
4216
  cred = credential.Credential(
@@ -3731,18 +4222,18 @@ def doDescribeSnapshotsDeniedActions(args, parsed_globals):
3731
4222
  endpoint=g_param[OptionsDefine.Endpoint],
3732
4223
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3733
4224
  )
3734
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4225
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3735
4226
  if g_param[OptionsDefine.Language]:
3736
4227
  profile.language = g_param[OptionsDefine.Language]
3737
4228
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3738
4229
  client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
3739
4230
  client._sdkVersion += ("_CLI_" + __version__)
3740
4231
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3741
- model = models.DescribeSnapshotsDeniedActionsRequest()
4232
+ model = models.ShareBlueprintAcrossAccountsRequest()
3742
4233
  model.from_json_string(json.dumps(args))
3743
4234
  start_time = time.time()
3744
4235
  while True:
3745
- rsp = client.DescribeSnapshotsDeniedActions(model)
4236
+ rsp = client.ShareBlueprintAcrossAccounts(model)
3746
4237
  result = rsp.to_json_string()
3747
4238
  try:
3748
4239
  json_obj = json.loads(result)
@@ -3761,7 +4252,7 @@ def doDescribeSnapshotsDeniedActions(args, parsed_globals):
3761
4252
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3762
4253
 
3763
4254
 
3764
- def doCreateInstanceSnapshot(args, parsed_globals):
4255
+ def doResetAttachCcn(args, parsed_globals):
3765
4256
  g_param = parse_global_arg(parsed_globals)
3766
4257
 
3767
4258
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3771,7 +4262,10 @@ def doCreateInstanceSnapshot(args, parsed_globals):
3771
4262
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3772
4263
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3773
4264
  )
3774
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4265
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4266
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4267
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3775
4269
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3776
4270
  else:
3777
4271
  cred = credential.Credential(
@@ -3783,18 +4277,73 @@ def doCreateInstanceSnapshot(args, parsed_globals):
3783
4277
  endpoint=g_param[OptionsDefine.Endpoint],
3784
4278
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3785
4279
  )
3786
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4280
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3787
4281
  if g_param[OptionsDefine.Language]:
3788
4282
  profile.language = g_param[OptionsDefine.Language]
3789
4283
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3790
4284
  client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
3791
4285
  client._sdkVersion += ("_CLI_" + __version__)
3792
4286
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3793
- model = models.CreateInstanceSnapshotRequest()
4287
+ model = models.ResetAttachCcnRequest()
3794
4288
  model.from_json_string(json.dumps(args))
3795
4289
  start_time = time.time()
3796
4290
  while True:
3797
- rsp = client.CreateInstanceSnapshot(model)
4291
+ rsp = client.ResetAttachCcn(model)
4292
+ result = rsp.to_json_string()
4293
+ try:
4294
+ json_obj = json.loads(result)
4295
+ except TypeError as e:
4296
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4297
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4298
+ break
4299
+ cur_time = time.time()
4300
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4301
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4302
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4303
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4304
+ else:
4305
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4306
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4307
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4308
+
4309
+
4310
+ def doResizeDisks(args, parsed_globals):
4311
+ g_param = parse_global_arg(parsed_globals)
4312
+
4313
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4314
+ cred = credential.CVMRoleCredential()
4315
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4316
+ cred = credential.STSAssumeRoleCredential(
4317
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4318
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4319
+ )
4320
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4321
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4322
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4324
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4325
+ else:
4326
+ cred = credential.Credential(
4327
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4328
+ )
4329
+ http_profile = HttpProfile(
4330
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4331
+ reqMethod="POST",
4332
+ endpoint=g_param[OptionsDefine.Endpoint],
4333
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4334
+ )
4335
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4336
+ if g_param[OptionsDefine.Language]:
4337
+ profile.language = g_param[OptionsDefine.Language]
4338
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4339
+ client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
4340
+ client._sdkVersion += ("_CLI_" + __version__)
4341
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4342
+ model = models.ResizeDisksRequest()
4343
+ model.from_json_string(json.dumps(args))
4344
+ start_time = time.time()
4345
+ while True:
4346
+ rsp = client.ResizeDisks(model)
3798
4347
  result = rsp.to_json_string()
3799
4348
  try:
3800
4349
  json_obj = json.loads(result)
@@ -3823,7 +4372,10 @@ def doModifyInstancesBundle(args, parsed_globals):
3823
4372
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
4373
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
4374
  )
3826
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4375
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4376
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4377
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
4379
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
4380
  else:
3829
4381
  cred = credential.Credential(
@@ -3835,7 +4387,7 @@ def doModifyInstancesBundle(args, parsed_globals):
3835
4387
  endpoint=g_param[OptionsDefine.Endpoint],
3836
4388
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
4389
  )
3838
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4390
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3839
4391
  if g_param[OptionsDefine.Language]:
3840
4392
  profile.language = g_param[OptionsDefine.Language]
3841
4393
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3880,7 +4432,7 @@ ACTION_MAP = {
3880
4432
  "DeleteBlueprints": doDeleteBlueprints,
3881
4433
  "CreateDisks": doCreateDisks,
3882
4434
  "DescribeAllScenes": doDescribeAllScenes,
3883
- "DescribeDiskDiscount": doDescribeDiskDiscount,
4435
+ "CancelShareBlueprintAcrossAccounts": doCancelShareBlueprintAcrossAccounts,
3884
4436
  "CreateFirewallRules": doCreateFirewallRules,
3885
4437
  "DescribeInstancesReturnable": doDescribeInstancesReturnable,
3886
4438
  "ModifyInstancesAttribute": doModifyInstancesAttribute,
@@ -3894,6 +4446,7 @@ ACTION_MAP = {
3894
4446
  "DescribeCcnAttachedInstances": doDescribeCcnAttachedInstances,
3895
4447
  "DescribeInstances": doDescribeInstances,
3896
4448
  "ImportKeyPair": doImportKeyPair,
4449
+ "DescribeImagesToShare": doDescribeImagesToShare,
3897
4450
  "DescribeInstancesTrafficPackages": doDescribeInstancesTrafficPackages,
3898
4451
  "InquirePriceCreateBlueprint": doInquirePriceCreateBlueprint,
3899
4452
  "AttachDisks": doAttachDisks,
@@ -3901,11 +4454,13 @@ ACTION_MAP = {
3901
4454
  "DeleteFirewallRules": doDeleteFirewallRules,
3902
4455
  "DisassociateInstancesKeyPairs": doDisassociateInstancesKeyPairs,
3903
4456
  "DescribeBundleDiscount": doDescribeBundleDiscount,
4457
+ "CreateInstances": doCreateInstances,
3904
4458
  "AttachCcn": doAttachCcn,
3905
4459
  "DescribeBlueprints": doDescribeBlueprints,
3906
4460
  "ResetInstancesPassword": doResetInstancesPassword,
3907
4461
  "ModifyInstancesRenewFlag": doModifyInstancesRenewFlag,
3908
4462
  "DescribeDisksDeniedActions": doDescribeDisksDeniedActions,
4463
+ "RenewInstances": doRenewInstances,
3909
4464
  "DescribeModifyInstanceBundles": doDescribeModifyInstanceBundles,
3910
4465
  "DescribeDisks": doDescribeDisks,
3911
4466
  "DescribeGeneralResourceQuotas": doDescribeGeneralResourceQuotas,
@@ -3928,7 +4483,7 @@ ACTION_MAP = {
3928
4483
  "DescribeSnapshots": doDescribeSnapshots,
3929
4484
  "ModifyFirewallRules": doModifyFirewallRules,
3930
4485
  "TerminateInstances": doTerminateInstances,
3931
- "RenewInstances": doRenewInstances,
4486
+ "SyncBlueprint": doSyncBlueprint,
3932
4487
  "TerminateDisks": doTerminateDisks,
3933
4488
  "DescribeInstanceVncUrl": doDescribeInstanceVncUrl,
3934
4489
  "ModifySnapshotAttribute": doModifySnapshotAttribute,
@@ -3942,13 +4497,16 @@ ACTION_MAP = {
3942
4497
  "IsolateInstances": doIsolateInstances,
3943
4498
  "DescribeDiskConfigs": doDescribeDiskConfigs,
3944
4499
  "ModifyFirewallRuleDescription": doModifyFirewallRuleDescription,
3945
- "ResetAttachCcn": doResetAttachCcn,
4500
+ "DescribeDiskDiscount": doDescribeDiskDiscount,
3946
4501
  "RebootInstances": doRebootInstances,
3947
- "CreateInstances": doCreateInstances,
4502
+ "CreateInstanceSnapshot": doCreateInstanceSnapshot,
4503
+ "ModifyImageSharePermission": doModifyImageSharePermission,
3948
4504
  "RenewDisks": doRenewDisks,
3949
- "CreateBlueprint": doCreateBlueprint,
3950
4505
  "DescribeSnapshotsDeniedActions": doDescribeSnapshotsDeniedActions,
3951
- "CreateInstanceSnapshot": doCreateInstanceSnapshot,
4506
+ "CreateBlueprint": doCreateBlueprint,
4507
+ "ShareBlueprintAcrossAccounts": doShareBlueprintAcrossAccounts,
4508
+ "ResetAttachCcn": doResetAttachCcn,
4509
+ "ResizeDisks": doResizeDisks,
3952
4510
  "ModifyInstancesBundle": doModifyInstancesBundle,
3953
4511
 
3954
4512
  }