tccli-intl-en 3.0.1248.1__py2.py3-none-any.whl → 3.1.33.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/services/__init__.py +32 -1
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +78 -28
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/bi_client.py +120 -48
- tccli/services/billing/billing_client.py +210 -84
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +794 -160
- tccli/services/ccc/v20200210/api.json +1778 -202
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +1770 -531
- tccli/services/cdb/v20170320/api.json +2166 -335
- tccli/services/cdb/v20170320/examples.json +126 -6
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdn/v20180606/api.json +22 -22
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1149 -259
- tccli/services/ckafka/v20190819/api.json +3738 -1696
- tccli/services/ckafka/v20190819/examples.json +266 -162
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2273 -1020
- tccli/services/clb/v20180317/examples.json +184 -124
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +170 -68
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +598 -185
- tccli/services/cvm/v20170312/examples.json +172 -126
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +1887 -577
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +302 -76
- tccli/services/dnspod/v20210323/api.json +153 -0
- tccli/services/dnspod/v20210323/examples.json +16 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +2815 -146
- tccli/services/emr/v20190103/api.json +14527 -4841
- tccli/services/emr/v20190103/examples.json +404 -36
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +196 -53
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +546 -0
- tccli/services/hunyuan/v20230901/api.json +628 -0
- tccli/services/hunyuan/v20230901/examples.json +60 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/kms/v20190118/api.json +80 -3
- tccli/services/kms/v20190118/examples.json +3 -3
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +730 -172
- tccli/services/lighthouse/v20200324/api.json +502 -14
- tccli/services/lighthouse/v20200324/examples.json +59 -5
- tccli/services/live/live_client.py +600 -240
- tccli/services/lke/lke_client.py +450 -180
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +989 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +357 -90
- tccli/services/mdl/v20200326/api.json +1095 -77
- tccli/services/mdl/v20200326/examples.json +40 -16
- tccli/services/mdp/mdp_client.py +416 -124
- tccli/services/mdp/v20200527/api.json +335 -40
- tccli/services/mdp/v20200527/examples.json +95 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1404 -141
- tccli/services/mongodb/v20190725/api.json +2919 -677
- tccli/services/mongodb/v20190725/examples.json +190 -22
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +664 -15
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1721 -381
- tccli/services/mps/v20190612/api.json +4905 -561
- tccli/services/mps/v20190612/examples.json +221 -69
- tccli/services/mqtt/__init__.py +4 -0
- tccli/services/mqtt/mqtt_client.py +1610 -0
- tccli/services/mqtt/v20240516/api.json +3057 -0
- tccli/services/mqtt/v20240516/examples.json +213 -0
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +358 -76
- tccli/services/ocr/v20181119/api.json +731 -88
- tccli/services/ocr/v20181119/examples.json +40 -10
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/privatedns/privatedns_client.py +155 -62
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +545 -218
- tccli/services/redis/v20180412/api.json +227 -115
- tccli/services/redis/v20180412/examples.json +19 -19
- tccli/services/region/region_client.py +15 -6
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +145 -58
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3759 -480
- tccli/services/sqlserver/v20180328/api.json +8909 -2941
- tccli/services/sqlserver/v20180328/examples.json +447 -3
- tccli/services/ssl/ssl_client.py +190 -76
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +2576 -327
- tccli/services/tcsas/v20250106/api.json +8304 -3241
- tccli/services/tcsas/v20250106/examples.json +311 -15
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +1590 -540
- tccli/services/teo/v20220901/api.json +703 -71
- tccli/services/teo/v20220901/examples.json +88 -22
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +858 -276
- tccli/services/tke/v20180525/api.json +227 -0
- tccli/services/tke/v20180525/examples.json +24 -0
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +255 -102
- tccli/services/trtc/v20190722/api.json +135 -31
- tccli/services/trtc/v20190722/examples.json +7 -7
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/v20180717/api.json +2929 -296
- tccli/services/vod/v20180717/examples.json +40 -6
- tccli/services/vod/vod_client.py +1175 -358
- tccli/services/vpc/v20170312/api.json +1102 -137
- tccli/services/vpc/v20170312/examples.json +127 -23
- tccli/services/vpc/vpc_client.py +2241 -670
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/RECORD +245 -203
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/top_level.txt +0 -0
|
@@ -27,7 +27,10 @@ def doDetachDisks(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDetachDisks(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDeleteBlueprints(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDeleteBlueprints(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doCreateDisks(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doCreateDisks(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doDescribeAllScenes(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doDescribeAllScenes(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -225,7 +237,7 @@ def doDescribeAllScenes(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
228
|
-
def
|
|
240
|
+
def doCancelShareBlueprintAcrossAccounts(args, parsed_globals):
|
|
229
241
|
g_param = parse_global_arg(parsed_globals)
|
|
230
242
|
|
|
231
243
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -235,7 +247,10 @@ def doDescribeDiskDiscount(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,18 +262,18 @@ def doDescribeDiskDiscount(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
254
269
|
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
270
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
271
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
272
|
+
model = models.CancelShareBlueprintAcrossAccountsRequest()
|
|
258
273
|
model.from_json_string(json.dumps(args))
|
|
259
274
|
start_time = time.time()
|
|
260
275
|
while True:
|
|
261
|
-
rsp = client.
|
|
276
|
+
rsp = client.CancelShareBlueprintAcrossAccounts(model)
|
|
262
277
|
result = rsp.to_json_string()
|
|
263
278
|
try:
|
|
264
279
|
json_obj = json.loads(result)
|
|
@@ -287,7 +302,10 @@ def doCreateFirewallRules(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doCreateFirewallRules(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doDescribeInstancesReturnable(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doDescribeInstancesReturnable(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doModifyInstancesAttribute(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doModifyInstancesAttribute(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doDescribeZones(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doDescribeZones(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +522,10 @@ def doDescribeFirewallRulesTemplate(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,7 +537,7 @@ def doDescribeFirewallRulesTemplate(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +577,10 @@ def doCreateKeyPair(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,7 +592,7 @@ def doCreateKeyPair(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +632,10 @@ def doDescribeBundles(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,7 +647,7 @@ def doDescribeBundles(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +687,10 @@ def doDescribeInstancesDiskNum(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,7 +702,7 @@ def doDescribeInstancesDiskNum(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +742,10 @@ def doDeleteKeyPairs(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,7 +757,7 @@ def doDeleteKeyPairs(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +797,10 @@ def doModifyDisksRenewFlag(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,7 +812,7 @@ def doModifyDisksRenewFlag(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +852,10 @@ def doDescribeCcnAttachedInstances(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,7 +867,7 @@ def doDescribeCcnAttachedInstances(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +907,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,7 +922,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +962,10 @@ def doImportKeyPair(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,7 +977,7 @@ def doImportKeyPair(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -953,6 +1007,61 @@ def doImportKeyPair(args, parsed_globals):
|
|
|
953
1007
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1008
|
|
|
955
1009
|
|
|
1010
|
+
def doDescribeImagesToShare(args, parsed_globals):
|
|
1011
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1012
|
+
|
|
1013
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1014
|
+
cred = credential.CVMRoleCredential()
|
|
1015
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1016
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1017
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
|
+
)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1024
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1025
|
+
else:
|
|
1026
|
+
cred = credential.Credential(
|
|
1027
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1028
|
+
)
|
|
1029
|
+
http_profile = HttpProfile(
|
|
1030
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1031
|
+
reqMethod="POST",
|
|
1032
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1033
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1034
|
+
)
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1036
|
+
if g_param[OptionsDefine.Language]:
|
|
1037
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1038
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1039
|
+
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1040
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1041
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1042
|
+
model = models.DescribeImagesToShareRequest()
|
|
1043
|
+
model.from_json_string(json.dumps(args))
|
|
1044
|
+
start_time = time.time()
|
|
1045
|
+
while True:
|
|
1046
|
+
rsp = client.DescribeImagesToShare(model)
|
|
1047
|
+
result = rsp.to_json_string()
|
|
1048
|
+
try:
|
|
1049
|
+
json_obj = json.loads(result)
|
|
1050
|
+
except TypeError as e:
|
|
1051
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1052
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1053
|
+
break
|
|
1054
|
+
cur_time = time.time()
|
|
1055
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1056
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1057
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1058
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1059
|
+
else:
|
|
1060
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1061
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1062
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1063
|
+
|
|
1064
|
+
|
|
956
1065
|
def doDescribeInstancesTrafficPackages(args, parsed_globals):
|
|
957
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1067
|
|
|
@@ -963,7 +1072,10 @@ def doDescribeInstancesTrafficPackages(args, parsed_globals):
|
|
|
963
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1074
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1080
|
else:
|
|
969
1081
|
cred = credential.Credential(
|
|
@@ -975,7 +1087,7 @@ def doDescribeInstancesTrafficPackages(args, parsed_globals):
|
|
|
975
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1089
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1091
|
if g_param[OptionsDefine.Language]:
|
|
980
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1127,10 @@ def doInquirePriceCreateBlueprint(args, parsed_globals):
|
|
|
1015
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1129
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1135
|
else:
|
|
1021
1136
|
cred = credential.Credential(
|
|
@@ -1027,7 +1142,7 @@ def doInquirePriceCreateBlueprint(args, parsed_globals):
|
|
|
1027
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1144
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1146
|
if g_param[OptionsDefine.Language]:
|
|
1032
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1182,10 @@ def doAttachDisks(args, parsed_globals):
|
|
|
1067
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1184
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1190
|
else:
|
|
1073
1191
|
cred = credential.Credential(
|
|
@@ -1079,7 +1197,7 @@ def doAttachDisks(args, parsed_globals):
|
|
|
1079
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1199
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1201
|
if g_param[OptionsDefine.Language]:
|
|
1084
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1119,7 +1237,10 @@ def doAssociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1119
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1239
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1245
|
else:
|
|
1125
1246
|
cred = credential.Credential(
|
|
@@ -1131,7 +1252,7 @@ def doAssociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1131
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1254
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1256
|
if g_param[OptionsDefine.Language]:
|
|
1136
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1292,10 @@ def doDeleteFirewallRules(args, parsed_globals):
|
|
|
1171
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1294
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1300
|
else:
|
|
1177
1301
|
cred = credential.Credential(
|
|
@@ -1183,7 +1307,7 @@ def doDeleteFirewallRules(args, parsed_globals):
|
|
|
1183
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1309
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1311
|
if g_param[OptionsDefine.Language]:
|
|
1188
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1347,10 @@ def doDisassociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1223
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1349
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1355
|
else:
|
|
1229
1356
|
cred = credential.Credential(
|
|
@@ -1235,7 +1362,7 @@ def doDisassociateInstancesKeyPairs(args, parsed_globals):
|
|
|
1235
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1364
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1366
|
if g_param[OptionsDefine.Language]:
|
|
1240
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1402,10 @@ def doDescribeBundleDiscount(args, parsed_globals):
|
|
|
1275
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1404
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1410
|
else:
|
|
1281
1411
|
cred = credential.Credential(
|
|
@@ -1287,7 +1417,7 @@ def doDescribeBundleDiscount(args, parsed_globals):
|
|
|
1287
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1419
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1421
|
if g_param[OptionsDefine.Language]:
|
|
1292
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1317,6 +1447,61 @@ def doDescribeBundleDiscount(args, parsed_globals):
|
|
|
1317
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1318
1448
|
|
|
1319
1449
|
|
|
1450
|
+
def doCreateInstances(args, parsed_globals):
|
|
1451
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1452
|
+
|
|
1453
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1454
|
+
cred = credential.CVMRoleCredential()
|
|
1455
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1456
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1457
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1458
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1459
|
+
)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1464
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1465
|
+
else:
|
|
1466
|
+
cred = credential.Credential(
|
|
1467
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1468
|
+
)
|
|
1469
|
+
http_profile = HttpProfile(
|
|
1470
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1471
|
+
reqMethod="POST",
|
|
1472
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1473
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1474
|
+
)
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1476
|
+
if g_param[OptionsDefine.Language]:
|
|
1477
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1478
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1479
|
+
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1480
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1481
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1482
|
+
model = models.CreateInstancesRequest()
|
|
1483
|
+
model.from_json_string(json.dumps(args))
|
|
1484
|
+
start_time = time.time()
|
|
1485
|
+
while True:
|
|
1486
|
+
rsp = client.CreateInstances(model)
|
|
1487
|
+
result = rsp.to_json_string()
|
|
1488
|
+
try:
|
|
1489
|
+
json_obj = json.loads(result)
|
|
1490
|
+
except TypeError as e:
|
|
1491
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1492
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1493
|
+
break
|
|
1494
|
+
cur_time = time.time()
|
|
1495
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1496
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1497
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1498
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1499
|
+
else:
|
|
1500
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1501
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1502
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1503
|
+
|
|
1504
|
+
|
|
1320
1505
|
def doAttachCcn(args, parsed_globals):
|
|
1321
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1322
1507
|
|
|
@@ -1327,7 +1512,10 @@ def doAttachCcn(args, parsed_globals):
|
|
|
1327
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1514
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1520
|
else:
|
|
1333
1521
|
cred = credential.Credential(
|
|
@@ -1339,7 +1527,7 @@ def doAttachCcn(args, parsed_globals):
|
|
|
1339
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1529
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1531
|
if g_param[OptionsDefine.Language]:
|
|
1344
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1567,10 @@ def doDescribeBlueprints(args, parsed_globals):
|
|
|
1379
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1569
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1575
|
else:
|
|
1385
1576
|
cred = credential.Credential(
|
|
@@ -1391,7 +1582,7 @@ def doDescribeBlueprints(args, parsed_globals):
|
|
|
1391
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1584
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1586
|
if g_param[OptionsDefine.Language]:
|
|
1396
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1622,10 @@ def doResetInstancesPassword(args, parsed_globals):
|
|
|
1431
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1624
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1630
|
else:
|
|
1437
1631
|
cred = credential.Credential(
|
|
@@ -1443,7 +1637,7 @@ def doResetInstancesPassword(args, parsed_globals):
|
|
|
1443
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1639
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1641
|
if g_param[OptionsDefine.Language]:
|
|
1448
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1677,10 @@ def doModifyInstancesRenewFlag(args, parsed_globals):
|
|
|
1483
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1679
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1685
|
else:
|
|
1489
1686
|
cred = credential.Credential(
|
|
@@ -1495,7 +1692,7 @@ def doModifyInstancesRenewFlag(args, parsed_globals):
|
|
|
1495
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1694
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1696
|
if g_param[OptionsDefine.Language]:
|
|
1500
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1732,10 @@ def doDescribeDisksDeniedActions(args, parsed_globals):
|
|
|
1535
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1734
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1740
|
else:
|
|
1541
1741
|
cred = credential.Credential(
|
|
@@ -1547,7 +1747,7 @@ def doDescribeDisksDeniedActions(args, parsed_globals):
|
|
|
1547
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1749
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1751
|
if g_param[OptionsDefine.Language]:
|
|
1552
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1577,6 +1777,61 @@ def doDescribeDisksDeniedActions(args, parsed_globals):
|
|
|
1577
1777
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
1778
|
|
|
1579
1779
|
|
|
1780
|
+
def doRenewInstances(args, parsed_globals):
|
|
1781
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1782
|
+
|
|
1783
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1784
|
+
cred = credential.CVMRoleCredential()
|
|
1785
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1786
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1787
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1788
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1789
|
+
)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1794
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1795
|
+
else:
|
|
1796
|
+
cred = credential.Credential(
|
|
1797
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1798
|
+
)
|
|
1799
|
+
http_profile = HttpProfile(
|
|
1800
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1801
|
+
reqMethod="POST",
|
|
1802
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1803
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1804
|
+
)
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1806
|
+
if g_param[OptionsDefine.Language]:
|
|
1807
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1808
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1809
|
+
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1810
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1811
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1812
|
+
model = models.RenewInstancesRequest()
|
|
1813
|
+
model.from_json_string(json.dumps(args))
|
|
1814
|
+
start_time = time.time()
|
|
1815
|
+
while True:
|
|
1816
|
+
rsp = client.RenewInstances(model)
|
|
1817
|
+
result = rsp.to_json_string()
|
|
1818
|
+
try:
|
|
1819
|
+
json_obj = json.loads(result)
|
|
1820
|
+
except TypeError as e:
|
|
1821
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1822
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1823
|
+
break
|
|
1824
|
+
cur_time = time.time()
|
|
1825
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1826
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1827
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1828
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1829
|
+
else:
|
|
1830
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1831
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1832
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1833
|
+
|
|
1834
|
+
|
|
1580
1835
|
def doDescribeModifyInstanceBundles(args, parsed_globals):
|
|
1581
1836
|
g_param = parse_global_arg(parsed_globals)
|
|
1582
1837
|
|
|
@@ -1587,7 +1842,10 @@ def doDescribeModifyInstanceBundles(args, parsed_globals):
|
|
|
1587
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1844
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1850
|
else:
|
|
1593
1851
|
cred = credential.Credential(
|
|
@@ -1599,7 +1857,7 @@ def doDescribeModifyInstanceBundles(args, parsed_globals):
|
|
|
1599
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1859
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1861
|
if g_param[OptionsDefine.Language]:
|
|
1604
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1897,10 @@ def doDescribeDisks(args, parsed_globals):
|
|
|
1639
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1899
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1905
|
else:
|
|
1645
1906
|
cred = credential.Credential(
|
|
@@ -1651,7 +1912,7 @@ def doDescribeDisks(args, parsed_globals):
|
|
|
1651
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1914
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1916
|
if g_param[OptionsDefine.Language]:
|
|
1656
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1952,10 @@ def doDescribeGeneralResourceQuotas(args, parsed_globals):
|
|
|
1691
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1954
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1960
|
else:
|
|
1697
1961
|
cred = credential.Credential(
|
|
@@ -1703,7 +1967,7 @@ def doDescribeGeneralResourceQuotas(args, parsed_globals):
|
|
|
1703
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1969
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1971
|
if g_param[OptionsDefine.Language]:
|
|
1708
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +2007,10 @@ def doModifyBlueprintAttribute(args, parsed_globals):
|
|
|
1743
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2009
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2015
|
else:
|
|
1749
2016
|
cred = credential.Credential(
|
|
@@ -1755,7 +2022,7 @@ def doModifyBlueprintAttribute(args, parsed_globals):
|
|
|
1755
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
2024
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
2026
|
if g_param[OptionsDefine.Language]:
|
|
1760
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +2062,10 @@ def doDescribeInstancesDeniedActions(args, parsed_globals):
|
|
|
1795
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2064
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2070
|
else:
|
|
1801
2071
|
cred = credential.Credential(
|
|
@@ -1807,7 +2077,7 @@ def doDescribeInstancesDeniedActions(args, parsed_globals):
|
|
|
1807
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
2079
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
2081
|
if g_param[OptionsDefine.Language]:
|
|
1812
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +2117,10 @@ def doInquirePriceRenewInstances(args, parsed_globals):
|
|
|
1847
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2119
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2125
|
else:
|
|
1853
2126
|
cred = credential.Credential(
|
|
@@ -1859,7 +2132,7 @@ def doInquirePriceRenewInstances(args, parsed_globals):
|
|
|
1859
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2134
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2136
|
if g_param[OptionsDefine.Language]:
|
|
1864
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2172,10 @@ def doDeleteSnapshots(args, parsed_globals):
|
|
|
1899
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2174
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2180
|
else:
|
|
1905
2181
|
cred = credential.Credential(
|
|
@@ -1911,7 +2187,7 @@ def doDeleteSnapshots(args, parsed_globals):
|
|
|
1911
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2189
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2191
|
if g_param[OptionsDefine.Language]:
|
|
1916
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +2227,10 @@ def doInquirePriceCreateInstances(args, parsed_globals):
|
|
|
1951
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2229
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2235
|
else:
|
|
1957
2236
|
cred = credential.Credential(
|
|
@@ -1963,7 +2242,7 @@ def doInquirePriceCreateInstances(args, parsed_globals):
|
|
|
1963
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2244
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2246
|
if g_param[OptionsDefine.Language]:
|
|
1968
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2282,10 @@ def doDescribeInstanceLoginKeyPairAttribute(args, parsed_globals):
|
|
|
2003
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2284
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2290
|
else:
|
|
2009
2291
|
cred = credential.Credential(
|
|
@@ -2015,7 +2297,7 @@ def doDescribeInstanceLoginKeyPairAttribute(args, parsed_globals):
|
|
|
2015
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2299
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2301
|
if g_param[OptionsDefine.Language]:
|
|
2020
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2337,10 @@ def doModifyDisksAttribute(args, parsed_globals):
|
|
|
2055
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2339
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2345
|
else:
|
|
2061
2346
|
cred = credential.Credential(
|
|
@@ -2067,7 +2352,7 @@ def doModifyDisksAttribute(args, parsed_globals):
|
|
|
2067
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2354
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2356
|
if g_param[OptionsDefine.Language]:
|
|
2072
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2392,10 @@ def doStopInstances(args, parsed_globals):
|
|
|
2107
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2394
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2400
|
else:
|
|
2113
2401
|
cred = credential.Credential(
|
|
@@ -2119,7 +2407,7 @@ def doStopInstances(args, parsed_globals):
|
|
|
2119
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2409
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2411
|
if g_param[OptionsDefine.Language]:
|
|
2124
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2447,10 @@ def doModifyInstancesLoginKeyPairAttribute(args, parsed_globals):
|
|
|
2159
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2449
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2455
|
else:
|
|
2165
2456
|
cred = credential.Credential(
|
|
@@ -2171,7 +2462,7 @@ def doModifyInstancesLoginKeyPairAttribute(args, parsed_globals):
|
|
|
2171
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2464
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2466
|
if g_param[OptionsDefine.Language]:
|
|
2176
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2502,10 @@ def doDescribeRegions(args, parsed_globals):
|
|
|
2211
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2504
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2510
|
else:
|
|
2217
2511
|
cred = credential.Credential(
|
|
@@ -2223,7 +2517,7 @@ def doDescribeRegions(args, parsed_globals):
|
|
|
2223
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2519
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2521
|
if g_param[OptionsDefine.Language]:
|
|
2228
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2557,10 @@ def doDescribeDisksReturnable(args, parsed_globals):
|
|
|
2263
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2559
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2565
|
else:
|
|
2269
2566
|
cred = credential.Credential(
|
|
@@ -2275,7 +2572,7 @@ def doDescribeDisksReturnable(args, parsed_globals):
|
|
|
2275
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2574
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2576
|
if g_param[OptionsDefine.Language]:
|
|
2280
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2612,10 @@ def doInquirePriceRenewDisks(args, parsed_globals):
|
|
|
2315
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2614
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2620
|
else:
|
|
2321
2621
|
cred = credential.Credential(
|
|
@@ -2327,7 +2627,7 @@ def doInquirePriceRenewDisks(args, parsed_globals):
|
|
|
2327
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2629
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2631
|
if g_param[OptionsDefine.Language]:
|
|
2332
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2667,10 @@ def doDescribeBlueprintInstances(args, parsed_globals):
|
|
|
2367
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2669
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2675
|
else:
|
|
2373
2676
|
cred = credential.Credential(
|
|
@@ -2379,7 +2682,7 @@ def doDescribeBlueprintInstances(args, parsed_globals):
|
|
|
2379
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2684
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2686
|
if g_param[OptionsDefine.Language]:
|
|
2384
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2722,10 @@ def doResetInstance(args, parsed_globals):
|
|
|
2419
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2724
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2730
|
else:
|
|
2425
2731
|
cred = credential.Credential(
|
|
@@ -2431,7 +2737,7 @@ def doResetInstance(args, parsed_globals):
|
|
|
2431
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2739
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2741
|
if g_param[OptionsDefine.Language]:
|
|
2436
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2777,10 @@ def doApplyInstanceSnapshot(args, parsed_globals):
|
|
|
2471
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2779
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2785
|
else:
|
|
2477
2786
|
cred = credential.Credential(
|
|
@@ -2483,7 +2792,7 @@ def doApplyInstanceSnapshot(args, parsed_globals):
|
|
|
2483
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2794
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2796
|
if g_param[OptionsDefine.Language]:
|
|
2488
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2832,10 @@ def doDetachCcn(args, parsed_globals):
|
|
|
2523
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2834
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2840
|
else:
|
|
2529
2841
|
cred = credential.Credential(
|
|
@@ -2535,7 +2847,7 @@ def doDetachCcn(args, parsed_globals):
|
|
|
2535
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2849
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2851
|
if g_param[OptionsDefine.Language]:
|
|
2540
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2887,10 @@ def doDescribeSnapshots(args, parsed_globals):
|
|
|
2575
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2889
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2895
|
else:
|
|
2581
2896
|
cred = credential.Credential(
|
|
@@ -2587,7 +2902,7 @@ def doDescribeSnapshots(args, parsed_globals):
|
|
|
2587
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2904
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2906
|
if g_param[OptionsDefine.Language]:
|
|
2592
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2942,10 @@ def doModifyFirewallRules(args, parsed_globals):
|
|
|
2627
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2944
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2950
|
else:
|
|
2633
2951
|
cred = credential.Credential(
|
|
@@ -2639,7 +2957,7 @@ def doModifyFirewallRules(args, parsed_globals):
|
|
|
2639
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2959
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2961
|
if g_param[OptionsDefine.Language]:
|
|
2644
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2997,10 @@ def doTerminateInstances(args, parsed_globals):
|
|
|
2679
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2999
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3005
|
else:
|
|
2685
3006
|
cred = credential.Credential(
|
|
@@ -2691,7 +3012,7 @@ def doTerminateInstances(args, parsed_globals):
|
|
|
2691
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
3014
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
3016
|
if g_param[OptionsDefine.Language]:
|
|
2696
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2721,7 +3042,7 @@ def doTerminateInstances(args, parsed_globals):
|
|
|
2721
3042
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2722
3043
|
|
|
2723
3044
|
|
|
2724
|
-
def
|
|
3045
|
+
def doSyncBlueprint(args, parsed_globals):
|
|
2725
3046
|
g_param = parse_global_arg(parsed_globals)
|
|
2726
3047
|
|
|
2727
3048
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2731,7 +3052,10 @@ def doRenewInstances(args, parsed_globals):
|
|
|
2731
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3054
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3060
|
else:
|
|
2737
3061
|
cred = credential.Credential(
|
|
@@ -2743,18 +3067,18 @@ def doRenewInstances(args, parsed_globals):
|
|
|
2743
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3069
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3071
|
if g_param[OptionsDefine.Language]:
|
|
2748
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2750
3074
|
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2751
3075
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2752
3076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2753
|
-
model = models.
|
|
3077
|
+
model = models.SyncBlueprintRequest()
|
|
2754
3078
|
model.from_json_string(json.dumps(args))
|
|
2755
3079
|
start_time = time.time()
|
|
2756
3080
|
while True:
|
|
2757
|
-
rsp = client.
|
|
3081
|
+
rsp = client.SyncBlueprint(model)
|
|
2758
3082
|
result = rsp.to_json_string()
|
|
2759
3083
|
try:
|
|
2760
3084
|
json_obj = json.loads(result)
|
|
@@ -2783,7 +3107,10 @@ def doTerminateDisks(args, parsed_globals):
|
|
|
2783
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3109
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3115
|
else:
|
|
2789
3116
|
cred = credential.Credential(
|
|
@@ -2795,7 +3122,7 @@ def doTerminateDisks(args, parsed_globals):
|
|
|
2795
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3124
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3126
|
if g_param[OptionsDefine.Language]:
|
|
2800
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +3162,10 @@ def doDescribeInstanceVncUrl(args, parsed_globals):
|
|
|
2835
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3164
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3170
|
else:
|
|
2841
3171
|
cred = credential.Credential(
|
|
@@ -2847,7 +3177,7 @@ def doDescribeInstanceVncUrl(args, parsed_globals):
|
|
|
2847
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3179
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3181
|
if g_param[OptionsDefine.Language]:
|
|
2852
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +3217,10 @@ def doModifySnapshotAttribute(args, parsed_globals):
|
|
|
2887
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3219
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3225
|
else:
|
|
2893
3226
|
cred = credential.Credential(
|
|
@@ -2899,7 +3232,7 @@ def doModifySnapshotAttribute(args, parsed_globals):
|
|
|
2899
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3234
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3236
|
if g_param[OptionsDefine.Language]:
|
|
2904
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3272,10 @@ def doDescribeFirewallRules(args, parsed_globals):
|
|
|
2939
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3274
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3280
|
else:
|
|
2945
3281
|
cred = credential.Credential(
|
|
@@ -2951,7 +3287,7 @@ def doDescribeFirewallRules(args, parsed_globals):
|
|
|
2951
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3289
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3291
|
if g_param[OptionsDefine.Language]:
|
|
2956
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3327,10 @@ def doStartInstances(args, parsed_globals):
|
|
|
2991
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3329
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3335
|
else:
|
|
2997
3336
|
cred = credential.Credential(
|
|
@@ -3003,7 +3342,7 @@ def doStartInstances(args, parsed_globals):
|
|
|
3003
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3344
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3346
|
if g_param[OptionsDefine.Language]:
|
|
3008
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3382,10 @@ def doDescribeKeyPairs(args, parsed_globals):
|
|
|
3043
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3384
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3390
|
else:
|
|
3049
3391
|
cred = credential.Credential(
|
|
@@ -3055,7 +3397,7 @@ def doDescribeKeyPairs(args, parsed_globals):
|
|
|
3055
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3399
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3401
|
if g_param[OptionsDefine.Language]:
|
|
3060
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3437,10 @@ def doDescribeResetInstanceBlueprints(args, parsed_globals):
|
|
|
3095
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3439
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3445
|
else:
|
|
3101
3446
|
cred = credential.Credential(
|
|
@@ -3107,7 +3452,7 @@ def doDescribeResetInstanceBlueprints(args, parsed_globals):
|
|
|
3107
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3454
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3456
|
if g_param[OptionsDefine.Language]:
|
|
3112
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3492,10 @@ def doInquirePriceCreateDisks(args, parsed_globals):
|
|
|
3147
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3494
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3500
|
else:
|
|
3153
3501
|
cred = credential.Credential(
|
|
@@ -3159,7 +3507,7 @@ def doInquirePriceCreateDisks(args, parsed_globals):
|
|
|
3159
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3509
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3511
|
if g_param[OptionsDefine.Language]:
|
|
3164
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3547,10 @@ def doDescribeScenes(args, parsed_globals):
|
|
|
3199
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3549
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3555
|
else:
|
|
3205
3556
|
cred = credential.Credential(
|
|
@@ -3211,7 +3562,7 @@ def doDescribeScenes(args, parsed_globals):
|
|
|
3211
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3564
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3566
|
if g_param[OptionsDefine.Language]:
|
|
3216
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3602,10 @@ def doIsolateDisks(args, parsed_globals):
|
|
|
3251
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3604
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3610
|
else:
|
|
3257
3611
|
cred = credential.Credential(
|
|
@@ -3263,7 +3617,7 @@ def doIsolateDisks(args, parsed_globals):
|
|
|
3263
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3619
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3621
|
if g_param[OptionsDefine.Language]:
|
|
3268
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3657,10 @@ def doIsolateInstances(args, parsed_globals):
|
|
|
3303
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3659
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3665
|
else:
|
|
3309
3666
|
cred = credential.Credential(
|
|
@@ -3315,7 +3672,7 @@ def doIsolateInstances(args, parsed_globals):
|
|
|
3315
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3674
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3676
|
if g_param[OptionsDefine.Language]:
|
|
3320
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3712,10 @@ def doDescribeDiskConfigs(args, parsed_globals):
|
|
|
3355
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3714
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3720
|
else:
|
|
3361
3721
|
cred = credential.Credential(
|
|
@@ -3367,7 +3727,7 @@ def doDescribeDiskConfigs(args, parsed_globals):
|
|
|
3367
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3729
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3731
|
if g_param[OptionsDefine.Language]:
|
|
3372
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3767,10 @@ def doModifyFirewallRuleDescription(args, parsed_globals):
|
|
|
3407
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3769
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3775
|
else:
|
|
3413
3776
|
cred = credential.Credential(
|
|
@@ -3419,7 +3782,7 @@ def doModifyFirewallRuleDescription(args, parsed_globals):
|
|
|
3419
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3784
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3786
|
if g_param[OptionsDefine.Language]:
|
|
3424
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3449,7 +3812,7 @@ def doModifyFirewallRuleDescription(args, parsed_globals):
|
|
|
3449
3812
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3450
3813
|
|
|
3451
3814
|
|
|
3452
|
-
def
|
|
3815
|
+
def doDescribeDiskDiscount(args, parsed_globals):
|
|
3453
3816
|
g_param = parse_global_arg(parsed_globals)
|
|
3454
3817
|
|
|
3455
3818
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3459,7 +3822,10 @@ def doResetAttachCcn(args, parsed_globals):
|
|
|
3459
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3824
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3830
|
else:
|
|
3465
3831
|
cred = credential.Credential(
|
|
@@ -3471,18 +3837,18 @@ def doResetAttachCcn(args, parsed_globals):
|
|
|
3471
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3839
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3841
|
if g_param[OptionsDefine.Language]:
|
|
3476
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3478
3844
|
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3479
3845
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3480
3846
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3481
|
-
model = models.
|
|
3847
|
+
model = models.DescribeDiskDiscountRequest()
|
|
3482
3848
|
model.from_json_string(json.dumps(args))
|
|
3483
3849
|
start_time = time.time()
|
|
3484
3850
|
while True:
|
|
3485
|
-
rsp = client.
|
|
3851
|
+
rsp = client.DescribeDiskDiscount(model)
|
|
3486
3852
|
result = rsp.to_json_string()
|
|
3487
3853
|
try:
|
|
3488
3854
|
json_obj = json.loads(result)
|
|
@@ -3511,7 +3877,10 @@ def doRebootInstances(args, parsed_globals):
|
|
|
3511
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3879
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3885
|
else:
|
|
3517
3886
|
cred = credential.Credential(
|
|
@@ -3523,7 +3892,7 @@ def doRebootInstances(args, parsed_globals):
|
|
|
3523
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3894
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3896
|
if g_param[OptionsDefine.Language]:
|
|
3528
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3553,7 +3922,7 @@ def doRebootInstances(args, parsed_globals):
|
|
|
3553
3922
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3554
3923
|
|
|
3555
3924
|
|
|
3556
|
-
def
|
|
3925
|
+
def doCreateInstanceSnapshot(args, parsed_globals):
|
|
3557
3926
|
g_param = parse_global_arg(parsed_globals)
|
|
3558
3927
|
|
|
3559
3928
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3563,7 +3932,10 @@ def doCreateInstances(args, parsed_globals):
|
|
|
3563
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3934
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3940
|
else:
|
|
3569
3941
|
cred = credential.Credential(
|
|
@@ -3575,18 +3947,73 @@ def doCreateInstances(args, parsed_globals):
|
|
|
3575
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3949
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3951
|
if g_param[OptionsDefine.Language]:
|
|
3580
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3582
3954
|
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3583
3955
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3584
3956
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3585
|
-
model = models.
|
|
3957
|
+
model = models.CreateInstanceSnapshotRequest()
|
|
3586
3958
|
model.from_json_string(json.dumps(args))
|
|
3587
3959
|
start_time = time.time()
|
|
3588
3960
|
while True:
|
|
3589
|
-
rsp = client.
|
|
3961
|
+
rsp = client.CreateInstanceSnapshot(model)
|
|
3962
|
+
result = rsp.to_json_string()
|
|
3963
|
+
try:
|
|
3964
|
+
json_obj = json.loads(result)
|
|
3965
|
+
except TypeError as e:
|
|
3966
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3967
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3968
|
+
break
|
|
3969
|
+
cur_time = time.time()
|
|
3970
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3971
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3972
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3973
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3974
|
+
else:
|
|
3975
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3976
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3977
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3978
|
+
|
|
3979
|
+
|
|
3980
|
+
def doModifyImageSharePermission(args, parsed_globals):
|
|
3981
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3982
|
+
|
|
3983
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3984
|
+
cred = credential.CVMRoleCredential()
|
|
3985
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3986
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3987
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3988
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3989
|
+
)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3994
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3995
|
+
else:
|
|
3996
|
+
cred = credential.Credential(
|
|
3997
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3998
|
+
)
|
|
3999
|
+
http_profile = HttpProfile(
|
|
4000
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4001
|
+
reqMethod="POST",
|
|
4002
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4003
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4004
|
+
)
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4006
|
+
if g_param[OptionsDefine.Language]:
|
|
4007
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4008
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4009
|
+
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4010
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4011
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4012
|
+
model = models.ModifyImageSharePermissionRequest()
|
|
4013
|
+
model.from_json_string(json.dumps(args))
|
|
4014
|
+
start_time = time.time()
|
|
4015
|
+
while True:
|
|
4016
|
+
rsp = client.ModifyImageSharePermission(model)
|
|
3590
4017
|
result = rsp.to_json_string()
|
|
3591
4018
|
try:
|
|
3592
4019
|
json_obj = json.loads(result)
|
|
@@ -3615,7 +4042,10 @@ def doRenewDisks(args, parsed_globals):
|
|
|
3615
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
4044
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
4050
|
else:
|
|
3621
4051
|
cred = credential.Credential(
|
|
@@ -3627,7 +4057,7 @@ def doRenewDisks(args, parsed_globals):
|
|
|
3627
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
4059
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
4061
|
if g_param[OptionsDefine.Language]:
|
|
3632
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3657,6 +4087,61 @@ def doRenewDisks(args, parsed_globals):
|
|
|
3657
4087
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3658
4088
|
|
|
3659
4089
|
|
|
4090
|
+
def doDescribeSnapshotsDeniedActions(args, parsed_globals):
|
|
4091
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4092
|
+
|
|
4093
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4094
|
+
cred = credential.CVMRoleCredential()
|
|
4095
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4096
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4097
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4098
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4099
|
+
)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4104
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4105
|
+
else:
|
|
4106
|
+
cred = credential.Credential(
|
|
4107
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4108
|
+
)
|
|
4109
|
+
http_profile = HttpProfile(
|
|
4110
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4111
|
+
reqMethod="POST",
|
|
4112
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4113
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4114
|
+
)
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4116
|
+
if g_param[OptionsDefine.Language]:
|
|
4117
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4118
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4119
|
+
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4120
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4121
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4122
|
+
model = models.DescribeSnapshotsDeniedActionsRequest()
|
|
4123
|
+
model.from_json_string(json.dumps(args))
|
|
4124
|
+
start_time = time.time()
|
|
4125
|
+
while True:
|
|
4126
|
+
rsp = client.DescribeSnapshotsDeniedActions(model)
|
|
4127
|
+
result = rsp.to_json_string()
|
|
4128
|
+
try:
|
|
4129
|
+
json_obj = json.loads(result)
|
|
4130
|
+
except TypeError as e:
|
|
4131
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4132
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4133
|
+
break
|
|
4134
|
+
cur_time = time.time()
|
|
4135
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4136
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4137
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4138
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4139
|
+
else:
|
|
4140
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4141
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4142
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4143
|
+
|
|
4144
|
+
|
|
3660
4145
|
def doCreateBlueprint(args, parsed_globals):
|
|
3661
4146
|
g_param = parse_global_arg(parsed_globals)
|
|
3662
4147
|
|
|
@@ -3667,7 +4152,10 @@ def doCreateBlueprint(args, parsed_globals):
|
|
|
3667
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
4154
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
4160
|
else:
|
|
3673
4161
|
cred = credential.Credential(
|
|
@@ -3679,7 +4167,7 @@ def doCreateBlueprint(args, parsed_globals):
|
|
|
3679
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
4169
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
4171
|
if g_param[OptionsDefine.Language]:
|
|
3684
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3709,7 +4197,7 @@ def doCreateBlueprint(args, parsed_globals):
|
|
|
3709
4197
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3710
4198
|
|
|
3711
4199
|
|
|
3712
|
-
def
|
|
4200
|
+
def doShareBlueprintAcrossAccounts(args, parsed_globals):
|
|
3713
4201
|
g_param = parse_global_arg(parsed_globals)
|
|
3714
4202
|
|
|
3715
4203
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3719,7 +4207,10 @@ def doDescribeSnapshotsDeniedActions(args, parsed_globals):
|
|
|
3719
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4209
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4215
|
else:
|
|
3725
4216
|
cred = credential.Credential(
|
|
@@ -3731,18 +4222,18 @@ def doDescribeSnapshotsDeniedActions(args, parsed_globals):
|
|
|
3731
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4224
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4226
|
if g_param[OptionsDefine.Language]:
|
|
3736
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3738
4229
|
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3739
4230
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3740
4231
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3741
|
-
model = models.
|
|
4232
|
+
model = models.ShareBlueprintAcrossAccountsRequest()
|
|
3742
4233
|
model.from_json_string(json.dumps(args))
|
|
3743
4234
|
start_time = time.time()
|
|
3744
4235
|
while True:
|
|
3745
|
-
rsp = client.
|
|
4236
|
+
rsp = client.ShareBlueprintAcrossAccounts(model)
|
|
3746
4237
|
result = rsp.to_json_string()
|
|
3747
4238
|
try:
|
|
3748
4239
|
json_obj = json.loads(result)
|
|
@@ -3761,7 +4252,7 @@ def doDescribeSnapshotsDeniedActions(args, parsed_globals):
|
|
|
3761
4252
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3762
4253
|
|
|
3763
4254
|
|
|
3764
|
-
def
|
|
4255
|
+
def doResetAttachCcn(args, parsed_globals):
|
|
3765
4256
|
g_param = parse_global_arg(parsed_globals)
|
|
3766
4257
|
|
|
3767
4258
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3771,7 +4262,10 @@ def doCreateInstanceSnapshot(args, parsed_globals):
|
|
|
3771
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4264
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4270
|
else:
|
|
3777
4271
|
cred = credential.Credential(
|
|
@@ -3783,18 +4277,73 @@ def doCreateInstanceSnapshot(args, parsed_globals):
|
|
|
3783
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4279
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4281
|
if g_param[OptionsDefine.Language]:
|
|
3788
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3790
4284
|
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3791
4285
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3792
4286
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3793
|
-
model = models.
|
|
4287
|
+
model = models.ResetAttachCcnRequest()
|
|
3794
4288
|
model.from_json_string(json.dumps(args))
|
|
3795
4289
|
start_time = time.time()
|
|
3796
4290
|
while True:
|
|
3797
|
-
rsp = client.
|
|
4291
|
+
rsp = client.ResetAttachCcn(model)
|
|
4292
|
+
result = rsp.to_json_string()
|
|
4293
|
+
try:
|
|
4294
|
+
json_obj = json.loads(result)
|
|
4295
|
+
except TypeError as e:
|
|
4296
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4297
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4298
|
+
break
|
|
4299
|
+
cur_time = time.time()
|
|
4300
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4301
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4302
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4303
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4304
|
+
else:
|
|
4305
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4306
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4307
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4308
|
+
|
|
4309
|
+
|
|
4310
|
+
def doResizeDisks(args, parsed_globals):
|
|
4311
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4312
|
+
|
|
4313
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4314
|
+
cred = credential.CVMRoleCredential()
|
|
4315
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4316
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4317
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4318
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4319
|
+
)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4324
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4325
|
+
else:
|
|
4326
|
+
cred = credential.Credential(
|
|
4327
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4328
|
+
)
|
|
4329
|
+
http_profile = HttpProfile(
|
|
4330
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4331
|
+
reqMethod="POST",
|
|
4332
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4333
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4334
|
+
)
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4336
|
+
if g_param[OptionsDefine.Language]:
|
|
4337
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4338
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4339
|
+
client = mod.LighthouseClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4340
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4341
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4342
|
+
model = models.ResizeDisksRequest()
|
|
4343
|
+
model.from_json_string(json.dumps(args))
|
|
4344
|
+
start_time = time.time()
|
|
4345
|
+
while True:
|
|
4346
|
+
rsp = client.ResizeDisks(model)
|
|
3798
4347
|
result = rsp.to_json_string()
|
|
3799
4348
|
try:
|
|
3800
4349
|
json_obj = json.loads(result)
|
|
@@ -3823,7 +4372,10 @@ def doModifyInstancesBundle(args, parsed_globals):
|
|
|
3823
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4374
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4380
|
else:
|
|
3829
4381
|
cred = credential.Credential(
|
|
@@ -3835,7 +4387,7 @@ def doModifyInstancesBundle(args, parsed_globals):
|
|
|
3835
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4389
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4391
|
if g_param[OptionsDefine.Language]:
|
|
3840
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3880,7 +4432,7 @@ ACTION_MAP = {
|
|
|
3880
4432
|
"DeleteBlueprints": doDeleteBlueprints,
|
|
3881
4433
|
"CreateDisks": doCreateDisks,
|
|
3882
4434
|
"DescribeAllScenes": doDescribeAllScenes,
|
|
3883
|
-
"
|
|
4435
|
+
"CancelShareBlueprintAcrossAccounts": doCancelShareBlueprintAcrossAccounts,
|
|
3884
4436
|
"CreateFirewallRules": doCreateFirewallRules,
|
|
3885
4437
|
"DescribeInstancesReturnable": doDescribeInstancesReturnable,
|
|
3886
4438
|
"ModifyInstancesAttribute": doModifyInstancesAttribute,
|
|
@@ -3894,6 +4446,7 @@ ACTION_MAP = {
|
|
|
3894
4446
|
"DescribeCcnAttachedInstances": doDescribeCcnAttachedInstances,
|
|
3895
4447
|
"DescribeInstances": doDescribeInstances,
|
|
3896
4448
|
"ImportKeyPair": doImportKeyPair,
|
|
4449
|
+
"DescribeImagesToShare": doDescribeImagesToShare,
|
|
3897
4450
|
"DescribeInstancesTrafficPackages": doDescribeInstancesTrafficPackages,
|
|
3898
4451
|
"InquirePriceCreateBlueprint": doInquirePriceCreateBlueprint,
|
|
3899
4452
|
"AttachDisks": doAttachDisks,
|
|
@@ -3901,11 +4454,13 @@ ACTION_MAP = {
|
|
|
3901
4454
|
"DeleteFirewallRules": doDeleteFirewallRules,
|
|
3902
4455
|
"DisassociateInstancesKeyPairs": doDisassociateInstancesKeyPairs,
|
|
3903
4456
|
"DescribeBundleDiscount": doDescribeBundleDiscount,
|
|
4457
|
+
"CreateInstances": doCreateInstances,
|
|
3904
4458
|
"AttachCcn": doAttachCcn,
|
|
3905
4459
|
"DescribeBlueprints": doDescribeBlueprints,
|
|
3906
4460
|
"ResetInstancesPassword": doResetInstancesPassword,
|
|
3907
4461
|
"ModifyInstancesRenewFlag": doModifyInstancesRenewFlag,
|
|
3908
4462
|
"DescribeDisksDeniedActions": doDescribeDisksDeniedActions,
|
|
4463
|
+
"RenewInstances": doRenewInstances,
|
|
3909
4464
|
"DescribeModifyInstanceBundles": doDescribeModifyInstanceBundles,
|
|
3910
4465
|
"DescribeDisks": doDescribeDisks,
|
|
3911
4466
|
"DescribeGeneralResourceQuotas": doDescribeGeneralResourceQuotas,
|
|
@@ -3928,7 +4483,7 @@ ACTION_MAP = {
|
|
|
3928
4483
|
"DescribeSnapshots": doDescribeSnapshots,
|
|
3929
4484
|
"ModifyFirewallRules": doModifyFirewallRules,
|
|
3930
4485
|
"TerminateInstances": doTerminateInstances,
|
|
3931
|
-
"
|
|
4486
|
+
"SyncBlueprint": doSyncBlueprint,
|
|
3932
4487
|
"TerminateDisks": doTerminateDisks,
|
|
3933
4488
|
"DescribeInstanceVncUrl": doDescribeInstanceVncUrl,
|
|
3934
4489
|
"ModifySnapshotAttribute": doModifySnapshotAttribute,
|
|
@@ -3942,13 +4497,16 @@ ACTION_MAP = {
|
|
|
3942
4497
|
"IsolateInstances": doIsolateInstances,
|
|
3943
4498
|
"DescribeDiskConfigs": doDescribeDiskConfigs,
|
|
3944
4499
|
"ModifyFirewallRuleDescription": doModifyFirewallRuleDescription,
|
|
3945
|
-
"
|
|
4500
|
+
"DescribeDiskDiscount": doDescribeDiskDiscount,
|
|
3946
4501
|
"RebootInstances": doRebootInstances,
|
|
3947
|
-
"
|
|
4502
|
+
"CreateInstanceSnapshot": doCreateInstanceSnapshot,
|
|
4503
|
+
"ModifyImageSharePermission": doModifyImageSharePermission,
|
|
3948
4504
|
"RenewDisks": doRenewDisks,
|
|
3949
|
-
"CreateBlueprint": doCreateBlueprint,
|
|
3950
4505
|
"DescribeSnapshotsDeniedActions": doDescribeSnapshotsDeniedActions,
|
|
3951
|
-
"
|
|
4506
|
+
"CreateBlueprint": doCreateBlueprint,
|
|
4507
|
+
"ShareBlueprintAcrossAccounts": doShareBlueprintAcrossAccounts,
|
|
4508
|
+
"ResetAttachCcn": doResetAttachCcn,
|
|
4509
|
+
"ResizeDisks": doResizeDisks,
|
|
3952
4510
|
"ModifyInstancesBundle": doModifyInstancesBundle,
|
|
3953
4511
|
|
|
3954
4512
|
}
|