tccli-intl-en 3.0.1265.1__py2.py3-none-any.whl → 3.0.1283.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (185) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/services/__init__.py +5 -1
  4. tccli/services/advisor/advisor_client.py +10 -4
  5. tccli/services/aiart/aiart_client.py +5 -2
  6. tccli/services/ams/ams_client.py +20 -8
  7. tccli/services/antiddos/antiddos_client.py +350 -140
  8. tccli/services/apigateway/apigateway_client.py +465 -186
  9. tccli/services/apm/apm_client.py +835 -68
  10. tccli/services/apm/v20210622/api.json +3936 -1145
  11. tccli/services/apm/v20210622/examples.json +133 -23
  12. tccli/services/asr/asr_client.py +10 -4
  13. tccli/services/autoscaling/autoscaling_client.py +290 -116
  14. tccli/services/autoscaling/v20180419/api.json +1 -1
  15. tccli/services/batch/batch_client.py +140 -56
  16. tccli/services/bi/bi_client.py +120 -48
  17. tccli/services/billing/billing_client.py +210 -84
  18. tccli/services/cam/cam_client.py +405 -162
  19. tccli/services/captcha/captcha_client.py +5 -2
  20. tccli/services/car/car_client.py +165 -66
  21. tccli/services/cbs/cbs_client.py +190 -76
  22. tccli/services/ccc/ccc_client.py +515 -146
  23. tccli/services/ccc/v20200210/api.json +511 -27
  24. tccli/services/ccc/v20200210/examples.json +24 -0
  25. tccli/services/cdb/cdb_client.py +665 -266
  26. tccli/services/cdc/cdc_client.py +100 -40
  27. tccli/services/cdn/cdn_client.py +220 -88
  28. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  29. tccli/services/cdwpg/cdwpg_client.py +120 -48
  30. tccli/services/cdz/cdz_client.py +5 -2
  31. tccli/services/cfg/cfg_client.py +80 -32
  32. tccli/services/cfs/cfs_client.py +195 -78
  33. tccli/services/cfw/cfw_client.py +330 -132
  34. tccli/services/chdfs/chdfs_client.py +145 -58
  35. tccli/services/ciam/ciam_client.py +80 -32
  36. tccli/services/ckafka/ckafka_client.py +629 -131
  37. tccli/services/ckafka/v20190819/api.json +2749 -1470
  38. tccli/services/ckafka/v20190819/examples.json +209 -155
  39. tccli/services/clb/clb_client.py +415 -166
  40. tccli/services/clb/v20180317/api.json +29 -14
  41. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  42. tccli/services/cls/cls_client.py +434 -173
  43. tccli/services/cmq/cmq_client.py +10 -4
  44. tccli/services/config/config_client.py +30 -12
  45. tccli/services/controlcenter/controlcenter_client.py +5 -2
  46. tccli/services/csip/csip_client.py +170 -68
  47. tccli/services/ctsdb/ctsdb_client.py +10 -4
  48. tccli/services/cvm/cvm_client.py +420 -168
  49. tccli/services/cvm/v20170312/api.json +239 -133
  50. tccli/services/cvm/v20170312/examples.json +101 -101
  51. tccli/services/cwp/cwp_client.py +2325 -930
  52. tccli/services/cynosdb/cynosdb_client.py +1887 -577
  53. tccli/services/cynosdb/v20190107/api.json +11763 -7697
  54. tccli/services/cynosdb/v20190107/examples.json +132 -4
  55. tccli/services/dataintegration/dataintegration_client.py +5 -2
  56. tccli/services/dayu/dayu_client.py +515 -206
  57. tccli/services/dbbrain/dbbrain_client.py +210 -84
  58. tccli/services/dc/dc_client.py +90 -36
  59. tccli/services/dcdb/dcdb_client.py +310 -124
  60. tccli/services/dlc/dlc_client.py +808 -216
  61. tccli/services/dlc/v20210125/api.json +534 -13
  62. tccli/services/dlc/v20210125/examples.json +40 -0
  63. tccli/services/dms/dms_client.py +10 -4
  64. tccli/services/dnspod/dnspod_client.py +200 -80
  65. tccli/services/domain/domain_client.py +120 -48
  66. tccli/services/dts/dts_client.py +415 -166
  67. tccli/services/eb/eb_client.py +130 -52
  68. tccli/services/ecdn/ecdn_client.py +75 -30
  69. tccli/services/ecm/ecm_client.py +620 -248
  70. tccli/services/eiam/eiam_client.py +200 -80
  71. tccli/services/emr/emr_client.py +385 -154
  72. tccli/services/es/es_client.py +105 -42
  73. tccli/services/facefusion/facefusion_client.py +15 -6
  74. tccli/services/faceid/faceid_client.py +95 -38
  75. tccli/services/faceid/v20180301/examples.json +2 -2
  76. tccli/services/gaap/gaap_client.py +440 -176
  77. tccli/services/gme/gme_client.py +50 -20
  78. tccli/services/gpm/gpm_client.py +90 -36
  79. tccli/services/gse/gse_client.py +110 -44
  80. tccli/services/gwlb/gwlb_client.py +90 -36
  81. tccli/services/iai/iai_client.py +145 -58
  82. tccli/services/iap/iap_client.py +30 -12
  83. tccli/services/ims/ims_client.py +5 -2
  84. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
  85. tccli/services/iotcloud/iotcloud_client.py +100 -40
  86. tccli/services/ip/ip_client.py +30 -12
  87. tccli/services/kms/kms_client.py +340 -136
  88. tccli/services/lcic/lcic_client.py +265 -106
  89. tccli/services/lighthouse/lighthouse_client.py +370 -148
  90. tccli/services/live/live_client.py +600 -240
  91. tccli/services/lke/lke_client.py +450 -180
  92. tccli/services/lkeap/lkeap_client.py +142 -12
  93. tccli/services/lkeap/v20240522/api.json +263 -0
  94. tccli/services/lkeap/v20240522/examples.json +35 -1
  95. tccli/services/mariadb/mariadb_client.py +250 -100
  96. tccli/services/mdc/mdc_client.py +90 -36
  97. tccli/services/mdl/mdl_client.py +165 -66
  98. tccli/services/mdl/v20200326/api.json +186 -12
  99. tccli/services/mdl/v20200326/examples.json +16 -16
  100. tccli/services/mdp/mdp_client.py +416 -124
  101. tccli/services/mdp/v20200527/api.json +146 -14
  102. tccli/services/mdp/v20200527/examples.json +95 -79
  103. tccli/services/message/__init__.py +4 -0
  104. tccli/services/message/message_client.py +210 -0
  105. tccli/services/message/v20181225/api.json +72 -0
  106. tccli/services/message/v20181225/examples.json +13 -0
  107. tccli/services/mongodb/mongodb_client.py +369 -58
  108. tccli/services/mongodb/v20190725/api.json +811 -226
  109. tccli/services/mongodb/v20190725/examples.json +54 -22
  110. tccli/services/monitor/monitor_client.py +1008 -296
  111. tccli/services/monitor/v20180724/api.json +657 -8
  112. tccli/services/monitor/v20180724/examples.json +152 -4
  113. tccli/services/mps/mps_client.py +684 -184
  114. tccli/services/mps/v20190612/api.json +1656 -222
  115. tccli/services/mps/v20190612/examples.json +60 -10
  116. tccli/services/msp/msp_client.py +35 -14
  117. tccli/services/ocr/ocr_client.py +246 -76
  118. tccli/services/ocr/v20181119/api.json +83 -4
  119. tccli/services/ocr/v20181119/examples.json +8 -0
  120. tccli/services/omics/omics_client.py +100 -40
  121. tccli/services/organization/organization_client.py +580 -232
  122. tccli/services/postgres/postgres_client.py +455 -182
  123. tccli/services/privatedns/privatedns_client.py +155 -62
  124. tccli/services/pts/pts_client.py +240 -96
  125. tccli/services/quota/quota_client.py +229 -2
  126. tccli/services/quota/v20241204/api.json +451 -2
  127. tccli/services/quota/v20241204/examples.json +42 -3
  128. tccli/services/rce/rce_client.py +5 -2
  129. tccli/services/redis/redis_client.py +545 -218
  130. tccli/services/redis/v20180412/api.json +225 -113
  131. tccli/services/redis/v20180412/examples.json +19 -19
  132. tccli/services/region/region_client.py +15 -6
  133. tccli/services/rum/rum_client.py +300 -120
  134. tccli/services/scf/scf_client.py +210 -84
  135. tccli/services/ses/ses_client.py +145 -58
  136. tccli/services/sms/sms_client.py +90 -36
  137. tccli/services/sqlserver/sqlserver_client.py +695 -278
  138. tccli/services/ssl/ssl_client.py +190 -76
  139. tccli/services/ssm/ssm_client.py +120 -48
  140. tccli/services/sts/sts_client.py +25 -10
  141. tccli/services/tag/tag_client.py +150 -60
  142. tccli/services/tat/tat_client.py +95 -38
  143. tccli/services/tbaas/tbaas_client.py +20 -8
  144. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  145. tccli/services/tchd/tchd_client.py +5 -2
  146. tccli/services/tcmpp/tcmpp_client.py +520 -208
  147. tccli/services/tcr/tcr_client.py +380 -152
  148. tccli/services/tcsas/tcsas_client.py +295 -118
  149. tccli/services/tcsas/v20250106/api.json +101 -61
  150. tccli/services/tcsas/v20250106/examples.json +2 -2
  151. tccli/services/tcss/tcss_client.py +1650 -660
  152. tccli/services/tdid/tdid_client.py +240 -96
  153. tccli/services/tdmq/tdmq_client.py +470 -188
  154. tccli/services/tem/tem_client.py +280 -112
  155. tccli/services/teo/teo_client.py +1365 -483
  156. tccli/services/teo/v20220901/api.json +354 -39
  157. tccli/services/teo/v20220901/examples.json +24 -0
  158. tccli/services/tione/tione_client.py +5 -2
  159. tccli/services/tiw/tiw_client.py +255 -102
  160. tccli/services/tke/tke_client.py +690 -276
  161. tccli/services/tms/tms_client.py +5 -2
  162. tccli/services/tmt/tmt_client.py +5 -2
  163. tccli/services/trabbit/trabbit_client.py +145 -58
  164. tccli/services/trro/trro_client.py +95 -38
  165. tccli/services/trtc/trtc_client.py +255 -102
  166. tccli/services/trtc/v20190722/api.json +6 -6
  167. tccli/services/trtc/v20190722/examples.json +7 -7
  168. tccli/services/tts/tts_client.py +5 -2
  169. tccli/services/vclm/vclm_client.py +10 -4
  170. tccli/services/vm/vm_client.py +20 -8
  171. tccli/services/vod/vod_client.py +895 -358
  172. tccli/services/vpc/v20170312/api.json +970 -75
  173. tccli/services/vpc/v20170312/examples.json +106 -10
  174. tccli/services/vpc/vpc_client.py +2159 -644
  175. tccli/services/waf/waf_client.py +535 -214
  176. tccli/services/wedata/v20250806/api.json +13644 -0
  177. tccli/services/wedata/v20250806/examples.json +621 -0
  178. tccli/services/wedata/wedata_client.py +6067 -1263
  179. tccli/services/yunjing/yunjing_client.py +355 -142
  180. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.0.1283.1.dist-info}/METADATA +4 -7
  181. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.0.1283.1.dist-info}/RECORD +185 -179
  182. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.0.1283.1.dist-info}/WHEEL +1 -1
  183. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.0.1283.1.dist-info}/entry_points.txt +0 -1
  184. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.0.1283.1.dist-info}/LICENSE +0 -0
  185. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.0.1283.1.dist-info}/top_level.txt +0 -0
@@ -106,7 +106,7 @@
106
106
  "status": "online"
107
107
  },
108
108
  "DeleteLoadBalancer": {
109
- "document": "This API (DeleteLoadBalancer) is used to delete one or more specified CLB instances.\nThis is an async API. After it is returned successfully, you can call the DescribeTaskStatus API with the returned RequestId as an input parameter to check whether this task is successful.",
109
+ "document": "This API is used to delete one or more specified CLB instances. After successful deletion, the listeners and forwarding rules under the CLB instance will be deleted together, and the backend service will be unbound.\nThis API is asynchronous. After it returns the result successfully, you can call the [DescribeTaskStatus](https://www.tencentcloud.com/document/product/214/30683?from_cn_redirect=1) API with the returned RequestId as an input parameter to query whether the task is successful.",
110
110
  "input": "DeleteLoadBalancerRequest",
111
111
  "name": "Deletes one or more CLB instances",
112
112
  "output": "DeleteLoadBalancerResponse",
@@ -148,7 +148,7 @@
148
148
  "status": "online"
149
149
  },
150
150
  "DeregisterFunctionTargets": {
151
- "document": "This API is used to unbind a SCF function with a CLB forwarding rule. For L7 listeners, you need to specify the forwarding rule by using `LocationId` or `Domain+Url`. \nThis is an async API. After it is returned successfully, you can call the [DescribeTaskStatus](https://intl.cloud.tencent.com/document/product/214/30683?from_cn_redirect=1) API with the returned RequestID to check whether this task is successful.\n<br/>Limits: \n\n- Binding with SCF is only available in Guangzhou, Shenzhen Finance, Shanghai, Shanghai Finance, Beijing, Chengdu, Hong Kong (China), Singapore, Mumbai, Tokyo, and Silicon Valley.\n- SCF functions can only be bound with CLB instances of bill-by-IP accounts but not with bill-by-CVM accounts. If you are using a bill-by-CVM account, we recommend upgrading it to a bill-by-IP account. For more information, please see [Checking Account Type](https://intl.cloud.tencent.com/document/product/1199/49090?from_cn_redirect=1).\n- SCF functions cannot be bound with classic CLB instances.\n- SCF functions cannot be bound with classic network-based CLB instances.\n- SCF functions in the same region can be bound with CLB instances. SCF functions can only be bound across VPCs but not regions.\n- SCF functions can only be bound with IPv4 and IPv6 NAT64 CLB instances, but currently not with IPv6 CLB instances.\n- SCF functions can only be bound with layer-7 HTTP and HTTPS listeners, but not with layer-7 QUIC listeners or layer-4 (TCP, UDP, and TCP SSL) listeners.\n- Only SCF event-triggered functions can be bound with CLB instances.",
151
+ "document": "This API is used to unbind a SCF function with a CLB forwarding rule. For L7 listeners, you need to specify the forwarding rule by using `LocationId` or `Domain+Url`. \nThis is an async API. After it is returned successfully, you can call the [DescribeTaskStatus](https://intl.cloud.tencent.com/document/product/214/30683?from_cn_redirect=1) API with the returned RequestID to check whether this task is successful.\n<br/>Limits: \n\n- Binding with SCF is only available in Guangzhou, Shenzhen Finance, Shanghai, Shanghai Finance, Beijing, Chengdu, Hong Kong (China), Singapore, Mumbai, Tokyo, and Silicon Valley.\n- SCF functions can only be bound with CLB instances of bill-by-IP accounts but not with bill-by-CVM accounts. If you are using a bill-by-CVM account, we recommend upgrading it to a bill-by-IP account. \n- SCF functions cannot be bound with classic CLB instances.\n- SCF functions cannot be bound with classic network-based CLB instances.\n- SCF functions in the same region can be bound with CLB instances. SCF functions can only be bound across VPCs but not regions.\n- SCF functions can only be bound with IPv4 and IPv6 NAT64 CLB instances, but currently not with IPv6 CLB instances.\n- SCF functions can only be bound with layer-7 HTTP and HTTPS listeners, but not with layer-7 QUIC listeners or layer-4 (TCP, UDP, and TCP SSL) listeners.\n- Only SCF event-triggered functions can be bound with CLB instances.",
152
152
  "input": "DeregisterFunctionTargetsRequest",
153
153
  "name": "Unbinding an SCF function from a forwarding rule",
154
154
  "output": "DeregisterFunctionTargetsResponse",
@@ -512,7 +512,7 @@
512
512
  "status": "online"
513
513
  },
514
514
  "RegisterFunctionTargets": {
515
- "document": "This API is used to bind an SCF function with the L7 forwarding rule of a CLB instance. Note that you need to create an L7 listener (HTTP, HTTPS) and forwarding rule first.\nThis is an async API. After it is returned successfully, you can call the `DescribeTaskStatus` API with the returned `RequestID` as an input parameter to check whether this task is successful.<br/>\n**Limits:**\n- Binding with SCF is only available in Guangzhou, Shenzhen Finance, Shanghai, Shanghai Finance, Beijing, Chengdu, Hong Kong (China), Singapore, Mumbai, Tokyo, and Silicon Valley.\n- SCF functions can only be bound with CLB instances of bill-by-IP accounts but not with bill-by-CVM accounts. If you are using a bill-by-CVM account, we recommend upgrading it to a bill-by-IP account. For more information, please see [Checking Account Type](https://intl.cloud.tencent.com/document/product/1199/49090?from_cn_redirect=1). \n- SCF functions cannot be bound with classic CLB instances.\n- SCF functions cannot be bound with classic network-based CLB instances.\n- SCF functions in the same region can be bound with CLB instances. SCF functions can only be bound across VPCs but not regions.\n- SCF functions can only be bound with IPv4 and IPv6 NAT64 CLB instances, but currently not with IPv6 CLB instances.\n- SCF functions can only be bound with layer-7 HTTP and HTTPS listeners, but not with layer-7 QUIC listeners or layer-4 (TCP, UDP, and TCP SSL) listeners.\n- Only SCF event-triggered functions can be bound with CLB instances.",
515
+ "document": "This API is used to bind an SCF function with the L7 forwarding rule of a CLB instance. Note that you need to create an L7 listener (HTTP, HTTPS) and forwarding rule first.\nThis is an async API. After it is returned successfully, you can call the `DescribeTaskStatus` API with the returned `RequestID` as an input parameter to check whether this task is successful.<br/>\n**Limits:**\n- Binding with SCF is only available in Guangzhou, Shenzhen Finance, Shanghai, Shanghai Finance, Beijing, Chengdu, Hong Kong (China), Singapore, Mumbai, Tokyo, and Silicon Valley.\n- SCF functions can only be bound with CLB instances of bill-by-IP accounts but not with bill-by-CVM accounts. If you are using a bill-by-CVM account, we recommend upgrading it to a bill-by-IP account. \n- SCF functions cannot be bound with classic CLB instances.\n- SCF functions cannot be bound with classic network-based CLB instances.\n- SCF functions in the same region can be bound with CLB instances. SCF functions can only be bound across VPCs but not regions.\n- SCF functions can only be bound with IPv4 and IPv6 NAT64 CLB instances, but currently not with IPv6 CLB instances.\n- SCF functions can only be bound with layer-7 HTTP and HTTPS listeners, but not with layer-7 QUIC listeners or layer-4 (TCP, UDP, and TCP SSL) listeners.\n- Only SCF event-triggered functions can be bound with CLB instances.",
516
516
  "input": "RegisterFunctionTargetsRequest",
517
517
  "name": "Binds an SCF function with a forwarding rule",
518
518
  "output": "RegisterFunctionTargetsResponse",
@@ -3120,12 +3120,21 @@
3120
3120
  "members": [
3121
3121
  {
3122
3122
  "disabled": false,
3123
- "document": "Array of IDs of the CLB instances to be deleted. Array length limit: 20.",
3124
- "example": "[\"lb-hsb93u5o\\r\\n\"]",
3123
+ "document": "CLB instance ID array to be deleted, which can be obtained by calling the [DescribeLoadBalancers](https://www.tencentcloud.com/document/product/214/30685?from_cn_redirect=1) API. The array can include up to 20 elements.",
3124
+ "example": "[\"lb-hsb93u5o\"]",
3125
3125
  "member": "string",
3126
3126
  "name": "LoadBalancerIds",
3127
3127
  "required": true,
3128
3128
  "type": "list"
3129
+ },
3130
+ {
3131
+ "disabled": false,
3132
+ "document": "Whether to forcibly delete the CLB instance. True indicates forced deletion; False indicates non-forced deletion, and blocking verification is required.\nThe default value is False.\nThe deletion operation is blocked by default in the following cases. If you confirm forced deletion, the value of the forced verification parameter ForceDelete should be set to True.\n1. The instance with 20 or more RS bound to the backend is deleted.\n2. The instance with RS bound to the backend and the maximum peak inbound/outbound bandwidth exceeding 10 Mbps within 5 minutes is deleted.\n3. Thirty or more instances are deleted within 5 minutes in a single region.",
3133
+ "example": "true",
3134
+ "member": "bool",
3135
+ "name": "ForceDelete",
3136
+ "required": false,
3137
+ "type": "bool"
3129
3138
  }
3130
3139
  ],
3131
3140
  "type": "object"
@@ -3346,7 +3355,7 @@
3346
3355
  {
3347
3356
  "disabled": false,
3348
3357
  "document": "CLB listener ID.",
3349
- "example": "lis-1234tgbh",
3358
+ "example": "lbl-1234tgbh",
3350
3359
  "member": "string",
3351
3360
  "name": "ListenerId",
3352
3361
  "required": true,
@@ -5362,9 +5371,10 @@
5362
5371
  {
5363
5372
  "disabled": false,
5364
5373
  "document": "Function namespace",
5365
- "example": "",
5374
+ "example": "default",
5366
5375
  "member": "string",
5367
5376
  "name": "FunctionNamespace",
5377
+ "output_required": true,
5368
5378
  "required": true,
5369
5379
  "type": "string",
5370
5380
  "value_allowed_null": false
@@ -5372,9 +5382,10 @@
5372
5382
  {
5373
5383
  "disabled": false,
5374
5384
  "document": "Function name",
5375
- "example": "",
5385
+ "example": "bxs-open-api",
5376
5386
  "member": "string",
5377
5387
  "name": "FunctionName",
5388
+ "output_required": true,
5378
5389
  "required": true,
5379
5390
  "type": "string",
5380
5391
  "value_allowed_null": false
@@ -5382,9 +5393,10 @@
5382
5393
  {
5383
5394
  "disabled": false,
5384
5395
  "document": "Function version name or alias",
5385
- "example": "",
5396
+ "example": "$LATEST",
5386
5397
  "member": "string",
5387
5398
  "name": "FunctionQualifier",
5399
+ "output_required": true,
5388
5400
  "required": true,
5389
5401
  "type": "string",
5390
5402
  "value_allowed_null": false
@@ -5392,9 +5404,10 @@
5392
5404
  {
5393
5405
  "disabled": false,
5394
5406
  "document": "Function qualifier type. Values: `VERSION`, `ALIAS`.\nNote: This field may return `null`, indicating that no valid values can be obtained.",
5395
- "example": "",
5407
+ "example": "VERSION",
5396
5408
  "member": "string",
5397
5409
  "name": "FunctionQualifierType",
5410
+ "output_required": true,
5398
5411
  "required": false,
5399
5412
  "type": "string",
5400
5413
  "value_allowed_null": true
@@ -5408,19 +5421,21 @@
5408
5421
  {
5409
5422
  "disabled": false,
5410
5423
  "document": "SCF related information\nNote: This field may return `null`, indicating that no valid values can be obtained.",
5411
- "example": "",
5424
+ "example": "",
5412
5425
  "member": "FunctionInfo",
5413
5426
  "name": "Function",
5427
+ "output_required": true,
5414
5428
  "required": true,
5415
5429
  "type": "object",
5416
- "value_allowed_null": true
5430
+ "value_allowed_null": false
5417
5431
  },
5418
5432
  {
5419
5433
  "disabled": false,
5420
5434
  "document": "Weight",
5421
- "example": "",
5435
+ "example": "10",
5422
5436
  "member": "uint64",
5423
5437
  "name": "Weight",
5438
+ "output_required": true,
5424
5439
  "required": false,
5425
5440
  "type": "int",
5426
5441
  "value_allowed_null": false
@@ -9081,7 +9096,7 @@
9081
9096
  {
9082
9097
  "disabled": false,
9083
9098
  "document": "CLB listener ID.",
9084
- "example": "lis-1234tgbh",
9099
+ "example": "lbl-1234tgbh",
9085
9100
  "member": "string",
9086
9101
  "name": "ListenerId",
9087
9102
  "required": true,
@@ -27,7 +27,10 @@ def doModifyAuditTrack(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doModifyAuditTrack(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doDescribeAuditTracks(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doDescribeAuditTracks(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doDescribeAuditTrack(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doDescribeAuditTrack(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doGetAttributeKey(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doGetAttributeKey(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +247,10 @@ def doCreateAuditTrack(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,7 +262,7 @@ def doCreateAuditTrack(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +302,10 @@ def doListCmqEnableRegion(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doListCmqEnableRegion(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doDeleteAuditTrack(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doDeleteAuditTrack(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -391,7 +412,10 @@ def doDeleteAudit(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,7 +427,7 @@ def doDeleteAudit(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +467,10 @@ def doDescribeEvents(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,7 +482,7 @@ def doDescribeEvents(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +522,10 @@ def doStopLogging(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,7 +537,7 @@ def doStopLogging(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +577,10 @@ def doStartLogging(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,7 +592,7 @@ def doStartLogging(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +632,10 @@ def doInquireAuditCredit(args, parsed_globals):
599
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
634
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
640
  else:
605
641
  cred = credential.Credential(
@@ -611,7 +647,7 @@ def doInquireAuditCredit(args, parsed_globals):
611
647
  endpoint=g_param[OptionsDefine.Endpoint],
612
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
649
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
651
  if g_param[OptionsDefine.Language]:
616
652
  profile.language = g_param[OptionsDefine.Language]
617
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +687,10 @@ def doUpdateAudit(args, parsed_globals):
651
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
689
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
695
  else:
657
696
  cred = credential.Credential(
@@ -663,7 +702,7 @@ def doUpdateAudit(args, parsed_globals):
663
702
  endpoint=g_param[OptionsDefine.Endpoint],
664
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
704
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
706
  if g_param[OptionsDefine.Language]:
668
707
  profile.language = g_param[OptionsDefine.Language]
669
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +742,10 @@ def doDescribeAudit(args, parsed_globals):
703
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
744
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
750
  else:
709
751
  cred = credential.Credential(
@@ -715,7 +757,7 @@ def doDescribeAudit(args, parsed_globals):
715
757
  endpoint=g_param[OptionsDefine.Endpoint],
716
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
759
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
761
  if g_param[OptionsDefine.Language]:
720
762
  profile.language = g_param[OptionsDefine.Language]
721
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +797,10 @@ def doCreateAudit(args, parsed_globals):
755
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
799
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
805
  else:
761
806
  cred = credential.Credential(
@@ -767,7 +812,7 @@ def doCreateAudit(args, parsed_globals):
767
812
  endpoint=g_param[OptionsDefine.Endpoint],
768
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
814
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
816
  if g_param[OptionsDefine.Language]:
772
817
  profile.language = g_param[OptionsDefine.Language]
773
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +852,10 @@ def doListCosEnableRegion(args, parsed_globals):
807
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
854
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
860
  else:
813
861
  cred = credential.Credential(
@@ -819,7 +867,7 @@ def doListCosEnableRegion(args, parsed_globals):
819
867
  endpoint=g_param[OptionsDefine.Endpoint],
820
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
869
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
871
  if g_param[OptionsDefine.Language]:
824
872
  profile.language = g_param[OptionsDefine.Language]
825
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +907,10 @@ def doLookUpEvents(args, parsed_globals):
859
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
909
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
915
  else:
865
916
  cred = credential.Credential(
@@ -871,7 +922,7 @@ def doLookUpEvents(args, parsed_globals):
871
922
  endpoint=g_param[OptionsDefine.Endpoint],
872
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
924
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
926
  if g_param[OptionsDefine.Language]:
876
927
  profile.language = g_param[OptionsDefine.Language]
877
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +962,10 @@ def doListAudits(args, parsed_globals):
911
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
964
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
970
  else:
917
971
  cred = credential.Credential(
@@ -923,7 +977,7 @@ def doListAudits(args, parsed_globals):
923
977
  endpoint=g_param[OptionsDefine.Endpoint],
924
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
979
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
981
  if g_param[OptionsDefine.Language]:
928
982
  profile.language = g_param[OptionsDefine.Language]
929
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]