tccli-intl-en 3.0.1265.1__py2.py3-none-any.whl → 3.1.1.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/services/__init__.py +5 -1
  4. tccli/services/advisor/advisor_client.py +10 -4
  5. tccli/services/aiart/aiart_client.py +5 -2
  6. tccli/services/ams/ams_client.py +20 -8
  7. tccli/services/antiddos/antiddos_client.py +350 -140
  8. tccli/services/apigateway/apigateway_client.py +465 -186
  9. tccli/services/apm/apm_client.py +835 -68
  10. tccli/services/apm/v20210622/api.json +3936 -1145
  11. tccli/services/apm/v20210622/examples.json +133 -23
  12. tccli/services/asr/asr_client.py +10 -4
  13. tccli/services/autoscaling/autoscaling_client.py +290 -116
  14. tccli/services/autoscaling/v20180419/api.json +1 -1
  15. tccli/services/batch/batch_client.py +140 -56
  16. tccli/services/bi/bi_client.py +120 -48
  17. tccli/services/billing/billing_client.py +210 -84
  18. tccli/services/cam/cam_client.py +405 -162
  19. tccli/services/captcha/captcha_client.py +5 -2
  20. tccli/services/car/car_client.py +165 -66
  21. tccli/services/cbs/cbs_client.py +190 -76
  22. tccli/services/ccc/ccc_client.py +515 -146
  23. tccli/services/ccc/v20200210/api.json +511 -27
  24. tccli/services/ccc/v20200210/examples.json +24 -0
  25. tccli/services/cdb/cdb_client.py +665 -266
  26. tccli/services/cdc/cdc_client.py +100 -40
  27. tccli/services/cdn/cdn_client.py +220 -88
  28. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  29. tccli/services/cdwpg/cdwpg_client.py +120 -48
  30. tccli/services/cdz/cdz_client.py +5 -2
  31. tccli/services/cfg/cfg_client.py +80 -32
  32. tccli/services/cfs/cfs_client.py +195 -78
  33. tccli/services/cfw/cfw_client.py +330 -132
  34. tccli/services/chdfs/chdfs_client.py +145 -58
  35. tccli/services/ciam/ciam_client.py +80 -32
  36. tccli/services/ckafka/ckafka_client.py +629 -131
  37. tccli/services/ckafka/v20190819/api.json +2749 -1470
  38. tccli/services/ckafka/v20190819/examples.json +209 -155
  39. tccli/services/clb/clb_client.py +415 -166
  40. tccli/services/clb/v20180317/api.json +1022 -647
  41. tccli/services/clb/v20180317/examples.json +19 -19
  42. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  43. tccli/services/cls/cls_client.py +434 -173
  44. tccli/services/cmq/cmq_client.py +10 -4
  45. tccli/services/config/config_client.py +30 -12
  46. tccli/services/controlcenter/controlcenter_client.py +5 -2
  47. tccli/services/csip/csip_client.py +170 -68
  48. tccli/services/ctsdb/ctsdb_client.py +10 -4
  49. tccli/services/cvm/cvm_client.py +420 -168
  50. tccli/services/cvm/v20170312/api.json +280 -174
  51. tccli/services/cvm/v20170312/examples.json +116 -116
  52. tccli/services/cwp/cwp_client.py +2325 -930
  53. tccli/services/cynosdb/cynosdb_client.py +1887 -577
  54. tccli/services/cynosdb/v20190107/api.json +11763 -7697
  55. tccli/services/cynosdb/v20190107/examples.json +132 -4
  56. tccli/services/dataintegration/dataintegration_client.py +5 -2
  57. tccli/services/dayu/dayu_client.py +515 -206
  58. tccli/services/dbbrain/dbbrain_client.py +210 -84
  59. tccli/services/dc/dc_client.py +90 -36
  60. tccli/services/dcdb/dcdb_client.py +310 -124
  61. tccli/services/dlc/dlc_client.py +808 -216
  62. tccli/services/dlc/v20210125/api.json +534 -13
  63. tccli/services/dlc/v20210125/examples.json +40 -0
  64. tccli/services/dms/dms_client.py +10 -4
  65. tccli/services/dnspod/dnspod_client.py +200 -80
  66. tccli/services/domain/domain_client.py +120 -48
  67. tccli/services/dts/dts_client.py +415 -166
  68. tccli/services/eb/eb_client.py +130 -52
  69. tccli/services/ecdn/ecdn_client.py +75 -30
  70. tccli/services/ecm/ecm_client.py +620 -248
  71. tccli/services/eiam/eiam_client.py +200 -80
  72. tccli/services/emr/emr_client.py +385 -154
  73. tccli/services/es/es_client.py +105 -42
  74. tccli/services/facefusion/facefusion_client.py +15 -6
  75. tccli/services/faceid/faceid_client.py +95 -38
  76. tccli/services/faceid/v20180301/examples.json +2 -2
  77. tccli/services/gaap/gaap_client.py +440 -176
  78. tccli/services/gme/gme_client.py +50 -20
  79. tccli/services/gpm/gpm_client.py +90 -36
  80. tccli/services/gse/gse_client.py +110 -44
  81. tccli/services/gwlb/gwlb_client.py +90 -36
  82. tccli/services/iai/iai_client.py +145 -58
  83. tccli/services/iap/iap_client.py +30 -12
  84. tccli/services/ims/ims_client.py +5 -2
  85. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
  86. tccli/services/iotcloud/iotcloud_client.py +100 -40
  87. tccli/services/ip/ip_client.py +30 -12
  88. tccli/services/kms/kms_client.py +340 -136
  89. tccli/services/lcic/lcic_client.py +265 -106
  90. tccli/services/lighthouse/lighthouse_client.py +370 -148
  91. tccli/services/live/live_client.py +600 -240
  92. tccli/services/lke/lke_client.py +450 -180
  93. tccli/services/lkeap/lkeap_client.py +142 -12
  94. tccli/services/lkeap/v20240522/api.json +263 -0
  95. tccli/services/lkeap/v20240522/examples.json +35 -1
  96. tccli/services/mariadb/mariadb_client.py +250 -100
  97. tccli/services/mdc/mdc_client.py +90 -36
  98. tccli/services/mdl/mdl_client.py +165 -66
  99. tccli/services/mdl/v20200326/api.json +186 -12
  100. tccli/services/mdl/v20200326/examples.json +16 -16
  101. tccli/services/mdp/mdp_client.py +416 -124
  102. tccli/services/mdp/v20200527/api.json +146 -14
  103. tccli/services/mdp/v20200527/examples.json +95 -79
  104. tccli/services/message/__init__.py +4 -0
  105. tccli/services/message/message_client.py +210 -0
  106. tccli/services/message/v20181225/api.json +72 -0
  107. tccli/services/message/v20181225/examples.json +13 -0
  108. tccli/services/mongodb/mongodb_client.py +369 -58
  109. tccli/services/mongodb/v20190725/api.json +811 -226
  110. tccli/services/mongodb/v20190725/examples.json +54 -22
  111. tccli/services/monitor/monitor_client.py +1008 -296
  112. tccli/services/monitor/v20180724/api.json +657 -8
  113. tccli/services/monitor/v20180724/examples.json +152 -4
  114. tccli/services/mps/mps_client.py +684 -184
  115. tccli/services/mps/v20190612/api.json +1656 -222
  116. tccli/services/mps/v20190612/examples.json +60 -10
  117. tccli/services/msp/msp_client.py +35 -14
  118. tccli/services/ocr/ocr_client.py +246 -76
  119. tccli/services/ocr/v20181119/api.json +119 -10
  120. tccli/services/ocr/v20181119/examples.json +8 -0
  121. tccli/services/omics/omics_client.py +100 -40
  122. tccli/services/organization/organization_client.py +580 -232
  123. tccli/services/postgres/postgres_client.py +455 -182
  124. tccli/services/privatedns/privatedns_client.py +155 -62
  125. tccli/services/pts/pts_client.py +240 -96
  126. tccli/services/quota/quota_client.py +229 -2
  127. tccli/services/quota/v20241204/api.json +451 -2
  128. tccli/services/quota/v20241204/examples.json +42 -3
  129. tccli/services/rce/rce_client.py +5 -2
  130. tccli/services/redis/redis_client.py +545 -218
  131. tccli/services/redis/v20180412/api.json +225 -113
  132. tccli/services/redis/v20180412/examples.json +19 -19
  133. tccli/services/region/region_client.py +15 -6
  134. tccli/services/rum/rum_client.py +300 -120
  135. tccli/services/scf/scf_client.py +210 -84
  136. tccli/services/ses/ses_client.py +145 -58
  137. tccli/services/sms/sms_client.py +90 -36
  138. tccli/services/sqlserver/sqlserver_client.py +695 -278
  139. tccli/services/ssl/ssl_client.py +190 -76
  140. tccli/services/ssm/ssm_client.py +120 -48
  141. tccli/services/sts/sts_client.py +25 -10
  142. tccli/services/tag/tag_client.py +150 -60
  143. tccli/services/tat/tat_client.py +95 -38
  144. tccli/services/tbaas/tbaas_client.py +20 -8
  145. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  146. tccli/services/tchd/tchd_client.py +5 -2
  147. tccli/services/tcmpp/tcmpp_client.py +520 -208
  148. tccli/services/tcr/tcr_client.py +380 -152
  149. tccli/services/tcsas/tcsas_client.py +295 -118
  150. tccli/services/tcsas/v20250106/api.json +101 -61
  151. tccli/services/tcsas/v20250106/examples.json +2 -2
  152. tccli/services/tcss/tcss_client.py +1650 -660
  153. tccli/services/tdid/tdid_client.py +240 -96
  154. tccli/services/tdmq/tdmq_client.py +470 -188
  155. tccli/services/tem/tem_client.py +280 -112
  156. tccli/services/teo/teo_client.py +1365 -483
  157. tccli/services/teo/v20220901/api.json +354 -39
  158. tccli/services/teo/v20220901/examples.json +24 -0
  159. tccli/services/tione/tione_client.py +5 -2
  160. tccli/services/tiw/tiw_client.py +255 -102
  161. tccli/services/tke/tke_client.py +690 -276
  162. tccli/services/tms/tms_client.py +5 -2
  163. tccli/services/tmt/tmt_client.py +5 -2
  164. tccli/services/trabbit/trabbit_client.py +145 -58
  165. tccli/services/trro/trro_client.py +95 -38
  166. tccli/services/trtc/trtc_client.py +255 -102
  167. tccli/services/trtc/v20190722/api.json +11 -11
  168. tccli/services/trtc/v20190722/examples.json +7 -7
  169. tccli/services/tts/tts_client.py +5 -2
  170. tccli/services/vclm/vclm_client.py +10 -4
  171. tccli/services/vm/vm_client.py +20 -8
  172. tccli/services/vod/vod_client.py +895 -358
  173. tccli/services/vpc/v20170312/api.json +970 -75
  174. tccli/services/vpc/v20170312/examples.json +106 -10
  175. tccli/services/vpc/vpc_client.py +2159 -644
  176. tccli/services/waf/waf_client.py +535 -214
  177. tccli/services/wedata/v20250806/api.json +13644 -0
  178. tccli/services/wedata/v20250806/examples.json +621 -0
  179. tccli/services/wedata/wedata_client.py +6067 -1263
  180. tccli/services/yunjing/yunjing_client.py +355 -142
  181. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/METADATA +4 -7
  182. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/RECORD +186 -180
  183. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/WHEEL +1 -1
  184. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/entry_points.txt +0 -1
  185. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/LICENSE +0 -0
  186. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/top_level.txt +0 -0
@@ -18,17 +18,17 @@
18
18
  ],
19
19
  "BatchDeregisterTargets": [
20
20
  {
21
- "document": " ",
22
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: BatchDeregisterTargets\n<Common request parameters>\n\n{\n \"Targets\": [\n {\n \"InstanceId\": \"ins-xxx\",\n \"ListenerId\": \"lbl-xxxx\",\n \"Weight\": \"10\",\n \"Port\": \"80\"\n }\n ],\n \"LoadBalancerId\": \"lb-xxxx\"\n}",
23
- "output": "{\n \"Response\": {\n \"FailListenerIdSet\": [],\n \"RequestId\": \"83129908-a282-4f9f-8ab-131a3025ba22\"\n }\n}",
24
- "title": "Unbinding an ENI"
21
+ "document": "",
22
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: BatchDeregisterTargets\n<common params>\n\n{\n \"Targets\": [\n {\n \"InstanceId\": \"ins-xxx\",\n \"ListenerId\": \"lbl-xxxx\",\n \"Weight\": 10,\n \"Port\": 80\n }\n ],\n \"LoadBalancerId\": \"lb-xxxx\"\n}",
23
+ "output": "{\n \"Response\": {\n \"FailListenerIdSet\": [],\n \"Message\": \"\",\n \"RequestId\": \"83129908-a282-4f9f-8ab-131a3025ba22\"\n }\n}",
24
+ "title": "Unbinding CVM instances"
25
25
  }
26
26
  ],
27
27
  "BatchModifyTargetTag": [
28
28
  {
29
29
  "document": "",
30
30
  "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: BatchModifyTargetTag\n<Common request parameters>\n\n\n\n{\n \"LoadBalancerId\": \"lb-xxxxxxxx\",\n \"ModifyList\": [\n {\n \"ListenerId\": \"lbl-yyyyyyyy\",\n \"Targets\": [\n {\n \"Port\": 1000,\n \"EniIp\": \"1.1.1.1\",\n \"Tag\": \"xxxx\"\n }\n ]\n }\n ]\n}",
31
- "output": "{\n \"Response\": {\n \"RequestId\": \"abc\"\n }\n}",
31
+ "output": "{\n \"Response\": {\n \"RequestId\": \"9cc30f1d-c237-422a-87ff-8f08c31a46e6\"\n }\n}",
32
32
  "title": "Setting Tags"
33
33
  }
34
34
  ],
@@ -73,31 +73,31 @@
73
73
  "CreateListener": [
74
74
  {
75
75
  "document": "This example shows you how to create an HTTPS listener and bind an existing certificate.",
76
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n\n\n{\n \"Protocol\": \"HTTPS\",\n \"Ports\": [\n \"7572\"\n ],\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertId\": \"MsJyaXVm\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
77
- "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-bzfmg9m6\"\n ],\n \"RequestId\": \"6082314c-030c-429d-9eae-2dc6b159b5b9\"\n }\n}",
76
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"Protocol\": \"HTTPS\",\n \"Ports\": [\n 7572\n ],\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertId\": \"MsJyaXVm\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
77
+ "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-4fbxq45k\"\n ],\n \"RequestId\": \"db8ae69f-ebda-402b-8d02-ead459aa6ff9\"\n }\n}",
78
78
  "title": "Creating an HTTPS Listener and Binding an Existing Certificate"
79
79
  },
80
80
  {
81
81
  "document": "This example shows you how to create a TCP listener and configure the health check settings.",
82
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n\n\n{\n \"HealthCheck\": {\n \"UnHealthNum\": \"4\",\n \"HealthNum\": \"4\",\n \"IntervalTime\": \"7\",\n \"TimeOut\": \"5\",\n \"HealthSwitch\": \"1\"\n },\n \"Protocol\": \"TCP\",\n \"Ports\": [\n \"7571\"\n ],\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
83
- "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-4fbxq45k\"\n ],\n \"RequestId\": \"db8ae69f-ebda-402b-8d02-ead459aa6ff9\"\n }\n}",
82
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"HealthCheck\": {\n \"UnHealthNum\": \"4\",\n \"HealthNum\": \"4\",\n \"IntervalTime\": \"7\",\n \"TimeOut\": \"5\",\n \"HealthSwitch\": \"1\"\n },\n \"Protocol\": \"TCP\",\n \"Ports\": [\n 7571\n ],\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
83
+ "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-lbbxvq26\"\n ],\n \"RequestId\": \"fff13c83-dcb5-481a-ba7c-30e92c276c19\"\n }\n}",
84
84
  "title": "Creating a TCP Listener and Configuring the Health Check Settings"
85
85
  },
86
86
  {
87
87
  "document": "This example shows you how to create an HTTPS listener and bind a new certificate.",
88
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n\n\n{\n \"Protocol\": \"HTTPS\",\n \"Ports\": [\n \"7573\"\n ],\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertContent\": \"-----BEGINCERTIFICATE-----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\\\\nYOuRvokzVT4lsaln5LKkKxw=\\\\n-----ENDCERTIFICATE-----\",\n \"CertName\": \"my-cert\",\n \"CertKey\": \"-----BEGINRSAPRIVATEKEY-----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\\\\nlFRW1kinLCP5y56SJEBz+DRSYV7ql9wOHyaM23sHkbCF0HAa\\\\n-----ENDRSAPRIVATEKEY-----\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
89
- "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-lbbxvq26\"\n ],\n \"RequestId\": \"fff13c83-dcb5-481a-ba7c-30e92c276c19\"\n }\n}",
88
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"Protocol\": \"HTTPS\",\n \"Ports\": [\n 7573\n ],\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertContent\": \"-----BEGINCERTIFICATE-----\\\\nxxxxxxxxxxxxxxxxxxxxxxx\\\\n-----ENDCERTIFICATE-----\",\n \"CertName\": \"my-cert\",\n \"CertKey\": \"-----BEGINRSAPRIVATEKEY-----\\\\nxxxxxxxxxxxxxxxxxxxxxxxx\\\\n-----ENDRSAPRIVATEKEY-----\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
89
+ "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-bzfmg9m6\"\n ],\n \"RequestId\": \"6082314c-030c-429d-9eae-2dc6b159b5b9\"\n }\n}",
90
90
  "title": "Creating an HTTPS Listener and Binding a New Certificate"
91
91
  },
92
92
  {
93
93
  "document": "This example shows you how to create a UDP listener with the default Ping health check.",
94
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n\n\n{\n \"HealthCheck\": {\n \"HealthSwitch\": \"1\"\n },\n \"Protocol\": \"UDP\",\n \"ListenerNames\": [\n \"lis_test\"\n ],\n \"Ports\": [\n \"432\"\n ],\n \"LoadBalancerId\": \"lb-6wlxe9rj\"\n}",
94
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"HealthCheck\": {\n \"HealthSwitch\": \"1\"\n },\n \"Protocol\": \"UDP\",\n \"ListenerNames\": [\n \"lis_test\"\n ],\n \"Ports\": [\n 432\n ],\n \"LoadBalancerId\": \"lb-6wlxe9rj\"\n}",
95
95
  "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-aev333n1\"\n ],\n \"RequestId\": \"3b81f03e-6088-448d-abaf-8a487d4f985a\"\n }\n}",
96
96
  "title": "Creating a UDP Listener with the Default Ping Health Check"
97
97
  },
98
98
  {
99
99
  "document": "This example shows you how to create two TCP listeners (respectively named lis0 and lis1) to respectively listen on ports 7569 and 7570.",
100
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n\n\n{\n \"ListenerNames\": [\n \"lis1\",\n \"lis0\"\n ],\n \"Protocol\": \"TCP\",\n \"Ports\": [\n \"7570\",\n \"7569\"\n ],\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
100
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"ListenerNames\": [\n \"lis1\",\n \"lis0\"\n ],\n \"Protocol\": \"TCP\",\n \"Ports\": [\n 7570,\n 7569\n ],\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
101
101
  "output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-d1ubsydq\",\n \"lbl-4udz130k\"\n ],\n \"RequestId\": \"8f272cef-14ff-458c-b67e-1bd21bd2942b\"\n }\n}",
102
102
  "title": "Creating Two TCP Listeners (Respectively Named lis0 and lis1) to Respectively Listen on Ports 7569 and 7570"
103
103
  }
@@ -627,13 +627,13 @@
627
627
  "ModifyListener": [
628
628
  {
629
629
  "document": "This example shows you how to modify the certificate bound to an HTTPS listener.",
630
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n\n\n{\n \"ListenerId\": \"lbl-4fbxq45k\",\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertId\": \"Nb1DY3hQ\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
630
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n{\n \"ListenerId\": \"lbl-4fbxq45k\",\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertId\": \"Nb1DY3hQ\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
631
631
  "output": "{\n \"Response\": {\n \"RequestId\": \"b64574f9-5bc7-4a63-a9d7-3671b6a6d62b\"\n }\n}",
632
632
  "title": "Modifying the Certificate Bound to an HTTPS Listener"
633
633
  },
634
634
  {
635
635
  "document": "This example shows you how to modify the name, health check parameters, and forwarding policy of a TCP listener.",
636
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n\n\n{\n \"HealthCheck\": {\n \"UnHealthNum\": \"5\",\n \"HealthNum\": \"5\",\n \"IntervalTime\": \"60\",\n \"TimeOut\": \"35\",\n \"HealthSwitch\": \"1\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\",\n \"ListenerId\": \"lbl-d1ubsydq\",\n \"ListenerName\": \"newlis\",\n \"Scheduler\": \"LEAST_CONN\",\n \"SessionExpireTime\": \"120\"\n}",
636
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n{\n \"HealthCheck\": {\n \"UnHealthNum\": 5,\n \"HealthNum\": 5,\n \"IntervalTime\": 60,\n \"TimeOut\": 35,\n \"HealthSwitch\": 1\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\",\n \"ListenerId\": \"lbl-d1ubsydq\",\n \"ListenerName\": \"newlis\",\n \"Scheduler\": \"LEAST_CONN\",\n \"SessionExpireTime\": 120\n}",
637
637
  "output": "{\n \"Response\": {\n \"RequestId\": \"8cd88c83-fd30-47c0-8e7a-89bf13a7a83c\"\n }\n}",
638
638
  "title": "Modifying the Name, Health Check Parameters, and Forwarding Policy of a TCP Listener"
639
639
  }
@@ -648,10 +648,10 @@
648
648
  ],
649
649
  "ModifyLoadBalancerSla": [
650
650
  {
651
- "document": "This example shows you how to upgrade a pay-as-you-go shared instance to an LCU-supported instance.",
652
- "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyLoadBalancerSla\n<Common request parameters>\n\n{\n \"LoadBalancerSla\": [\n {\n \"SlaType\": \"SLA\",\n \"LoadBalancerId\": \"lb-db2n****\"\n }\n ]\n}",
651
+ "document": "When upgrading a pay-as-you-go shared instance to a performance capacity instance, or adjusting the specifications of a performance capacity instance, the final instance specification is determined by the SlaType value set as needed.",
652
+ "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyLoadBalancerSla\n<Common request params>\n\n{\n \"LoadBalancerSla\": [\n {\n \"SlaType\": \"clb.c3.medium\",\n \"LoadBalancerId\": \"lb-db2n****\"\n }\n ]\n}",
653
653
  "output": "{\n \"Response\": {\n \"RequestId\": \"c1157c81-f3dc-4f2a-9346-76f161d548eb\"\n }\n}",
654
- "title": "Upgrading a shared instance to an LCU-supported instance"
654
+ "title": "Loadbalancer specification adjustment"
655
655
  }
656
656
  ],
657
657
  "ModifyLoadBalancersProject": [
@@ -808,7 +808,7 @@
808
808
  {
809
809
  "document": "This example shows you how to enable or disable a CLB instance.",
810
810
  "input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SetLoadBalancerStartStatus\n<Common request parameters>\n\n\n\n{\n \"LoadBalancerId\": \"lb-xxxxxxxx\",\n \"OperationType\": \"Stop\"\n}",
811
- "output": "{\n \"Response\": {\n \"RequestId\": \"abc\"\n }\n}",
811
+ "output": "{\n \"Response\": {\n \"RequestId\": \"b3196d4c-2722-4893-8d86-e33136199469\"\n }\n}",
812
812
  "title": "Enabling or Disabling a CLB Instance"
813
813
  }
814
814
  ],
@@ -27,7 +27,10 @@ def doModifyAuditTrack(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doModifyAuditTrack(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doDescribeAuditTracks(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doDescribeAuditTracks(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doDescribeAuditTrack(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doDescribeAuditTrack(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doGetAttributeKey(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doGetAttributeKey(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +247,10 @@ def doCreateAuditTrack(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,7 +262,7 @@ def doCreateAuditTrack(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +302,10 @@ def doListCmqEnableRegion(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doListCmqEnableRegion(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doDeleteAuditTrack(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doDeleteAuditTrack(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -391,7 +412,10 @@ def doDeleteAudit(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,7 +427,7 @@ def doDeleteAudit(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +467,10 @@ def doDescribeEvents(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,7 +482,7 @@ def doDescribeEvents(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +522,10 @@ def doStopLogging(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,7 +537,7 @@ def doStopLogging(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +577,10 @@ def doStartLogging(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,7 +592,7 @@ def doStartLogging(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +632,10 @@ def doInquireAuditCredit(args, parsed_globals):
599
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
634
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
640
  else:
605
641
  cred = credential.Credential(
@@ -611,7 +647,7 @@ def doInquireAuditCredit(args, parsed_globals):
611
647
  endpoint=g_param[OptionsDefine.Endpoint],
612
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
649
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
651
  if g_param[OptionsDefine.Language]:
616
652
  profile.language = g_param[OptionsDefine.Language]
617
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +687,10 @@ def doUpdateAudit(args, parsed_globals):
651
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
689
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
695
  else:
657
696
  cred = credential.Credential(
@@ -663,7 +702,7 @@ def doUpdateAudit(args, parsed_globals):
663
702
  endpoint=g_param[OptionsDefine.Endpoint],
664
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
704
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
706
  if g_param[OptionsDefine.Language]:
668
707
  profile.language = g_param[OptionsDefine.Language]
669
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +742,10 @@ def doDescribeAudit(args, parsed_globals):
703
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
744
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
750
  else:
709
751
  cred = credential.Credential(
@@ -715,7 +757,7 @@ def doDescribeAudit(args, parsed_globals):
715
757
  endpoint=g_param[OptionsDefine.Endpoint],
716
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
759
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
761
  if g_param[OptionsDefine.Language]:
720
762
  profile.language = g_param[OptionsDefine.Language]
721
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +797,10 @@ def doCreateAudit(args, parsed_globals):
755
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
799
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
805
  else:
761
806
  cred = credential.Credential(
@@ -767,7 +812,7 @@ def doCreateAudit(args, parsed_globals):
767
812
  endpoint=g_param[OptionsDefine.Endpoint],
768
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
814
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
816
  if g_param[OptionsDefine.Language]:
772
817
  profile.language = g_param[OptionsDefine.Language]
773
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +852,10 @@ def doListCosEnableRegion(args, parsed_globals):
807
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
854
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
860
  else:
813
861
  cred = credential.Credential(
@@ -819,7 +867,7 @@ def doListCosEnableRegion(args, parsed_globals):
819
867
  endpoint=g_param[OptionsDefine.Endpoint],
820
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
869
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
871
  if g_param[OptionsDefine.Language]:
824
872
  profile.language = g_param[OptionsDefine.Language]
825
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +907,10 @@ def doLookUpEvents(args, parsed_globals):
859
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
909
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
915
  else:
865
916
  cred = credential.Credential(
@@ -871,7 +922,7 @@ def doLookUpEvents(args, parsed_globals):
871
922
  endpoint=g_param[OptionsDefine.Endpoint],
872
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
924
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
926
  if g_param[OptionsDefine.Language]:
876
927
  profile.language = g_param[OptionsDefine.Language]
877
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +962,10 @@ def doListAudits(args, parsed_globals):
911
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
964
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
970
  else:
917
971
  cred = credential.Credential(
@@ -923,7 +977,7 @@ def doListAudits(args, parsed_globals):
923
977
  endpoint=g_param[OptionsDefine.Endpoint],
924
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
979
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
981
  if g_param[OptionsDefine.Language]:
928
982
  profile.language = g_param[OptionsDefine.Language]
929
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]