tccli-intl-en 3.0.1265.1__py2.py3-none-any.whl → 3.1.1.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/services/__init__.py +5 -1
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/bi_client.py +120 -48
- tccli/services/billing/billing_client.py +210 -84
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +515 -146
- tccli/services/ccc/v20200210/api.json +511 -27
- tccli/services/ccc/v20200210/examples.json +24 -0
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +5 -2
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +629 -131
- tccli/services/ckafka/v20190819/api.json +2749 -1470
- tccli/services/ckafka/v20190819/examples.json +209 -155
- tccli/services/clb/clb_client.py +415 -166
- tccli/services/clb/v20180317/api.json +1022 -647
- tccli/services/clb/v20180317/examples.json +19 -19
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +5 -2
- tccli/services/csip/csip_client.py +170 -68
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +420 -168
- tccli/services/cvm/v20170312/api.json +280 -174
- tccli/services/cvm/v20170312/examples.json +116 -116
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +1887 -577
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +808 -216
- tccli/services/dlc/v20210125/api.json +534 -13
- tccli/services/dlc/v20210125/examples.json +40 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +200 -80
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +385 -154
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/examples.json +2 -2
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +370 -148
- tccli/services/live/live_client.py +600 -240
- tccli/services/lke/lke_client.py +450 -180
- tccli/services/lkeap/lkeap_client.py +142 -12
- tccli/services/lkeap/v20240522/api.json +263 -0
- tccli/services/lkeap/v20240522/examples.json +35 -1
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +165 -66
- tccli/services/mdl/v20200326/api.json +186 -12
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/mdp_client.py +416 -124
- tccli/services/mdp/v20200527/api.json +146 -14
- tccli/services/mdp/v20200527/examples.json +95 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +369 -58
- tccli/services/mongodb/v20190725/api.json +811 -226
- tccli/services/mongodb/v20190725/examples.json +54 -22
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +657 -8
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +684 -184
- tccli/services/mps/v20190612/api.json +1656 -222
- tccli/services/mps/v20190612/examples.json +60 -10
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +246 -76
- tccli/services/ocr/v20181119/api.json +119 -10
- tccli/services/ocr/v20181119/examples.json +8 -0
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/privatedns/privatedns_client.py +155 -62
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/quota_client.py +229 -2
- tccli/services/quota/v20241204/api.json +451 -2
- tccli/services/quota/v20241204/examples.json +42 -3
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +545 -218
- tccli/services/redis/v20180412/api.json +225 -113
- tccli/services/redis/v20180412/examples.json +19 -19
- tccli/services/region/region_client.py +15 -6
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +145 -58
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +695 -278
- tccli/services/ssl/ssl_client.py +190 -76
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +101 -61
- tccli/services/tcsas/v20250106/examples.json +2 -2
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +470 -188
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +1365 -483
- tccli/services/teo/v20220901/api.json +354 -39
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/tione/tione_client.py +5 -2
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +690 -276
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +255 -102
- tccli/services/trtc/v20190722/api.json +11 -11
- tccli/services/trtc/v20190722/examples.json +7 -7
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/vod_client.py +895 -358
- tccli/services/vpc/v20170312/api.json +970 -75
- tccli/services/vpc/v20170312/examples.json +106 -10
- tccli/services/vpc/vpc_client.py +2159 -644
- tccli/services/waf/waf_client.py +535 -214
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/RECORD +186 -180
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/top_level.txt +0 -0
|
@@ -18,17 +18,17 @@
|
|
|
18
18
|
],
|
|
19
19
|
"BatchDeregisterTargets": [
|
|
20
20
|
{
|
|
21
|
-
"document": "
|
|
22
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: BatchDeregisterTargets\n<
|
|
23
|
-
"output": "{\n \"Response\": {\n \"FailListenerIdSet\": [],\n \"RequestId\": \"83129908-a282-4f9f-8ab-131a3025ba22\"\n }\n}",
|
|
24
|
-
"title": "Unbinding
|
|
21
|
+
"document": "",
|
|
22
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: BatchDeregisterTargets\n<common params>\n\n{\n \"Targets\": [\n {\n \"InstanceId\": \"ins-xxx\",\n \"ListenerId\": \"lbl-xxxx\",\n \"Weight\": 10,\n \"Port\": 80\n }\n ],\n \"LoadBalancerId\": \"lb-xxxx\"\n}",
|
|
23
|
+
"output": "{\n \"Response\": {\n \"FailListenerIdSet\": [],\n \"Message\": \"\",\n \"RequestId\": \"83129908-a282-4f9f-8ab-131a3025ba22\"\n }\n}",
|
|
24
|
+
"title": "Unbinding CVM instances"
|
|
25
25
|
}
|
|
26
26
|
],
|
|
27
27
|
"BatchModifyTargetTag": [
|
|
28
28
|
{
|
|
29
29
|
"document": "",
|
|
30
30
|
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: BatchModifyTargetTag\n<Common request parameters>\n\n\n\n{\n \"LoadBalancerId\": \"lb-xxxxxxxx\",\n \"ModifyList\": [\n {\n \"ListenerId\": \"lbl-yyyyyyyy\",\n \"Targets\": [\n {\n \"Port\": 1000,\n \"EniIp\": \"1.1.1.1\",\n \"Tag\": \"xxxx\"\n }\n ]\n }\n ]\n}",
|
|
31
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"
|
|
31
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"9cc30f1d-c237-422a-87ff-8f08c31a46e6\"\n }\n}",
|
|
32
32
|
"title": "Setting Tags"
|
|
33
33
|
}
|
|
34
34
|
],
|
|
@@ -73,31 +73,31 @@
|
|
|
73
73
|
"CreateListener": [
|
|
74
74
|
{
|
|
75
75
|
"document": "This example shows you how to create an HTTPS listener and bind an existing certificate.",
|
|
76
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n
|
|
77
|
-
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-
|
|
76
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"Protocol\": \"HTTPS\",\n \"Ports\": [\n 7572\n ],\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertId\": \"MsJyaXVm\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
|
|
77
|
+
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-4fbxq45k\"\n ],\n \"RequestId\": \"db8ae69f-ebda-402b-8d02-ead459aa6ff9\"\n }\n}",
|
|
78
78
|
"title": "Creating an HTTPS Listener and Binding an Existing Certificate"
|
|
79
79
|
},
|
|
80
80
|
{
|
|
81
81
|
"document": "This example shows you how to create a TCP listener and configure the health check settings.",
|
|
82
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n
|
|
83
|
-
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-
|
|
82
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"HealthCheck\": {\n \"UnHealthNum\": \"4\",\n \"HealthNum\": \"4\",\n \"IntervalTime\": \"7\",\n \"TimeOut\": \"5\",\n \"HealthSwitch\": \"1\"\n },\n \"Protocol\": \"TCP\",\n \"Ports\": [\n 7571\n ],\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
|
|
83
|
+
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-lbbxvq26\"\n ],\n \"RequestId\": \"fff13c83-dcb5-481a-ba7c-30e92c276c19\"\n }\n}",
|
|
84
84
|
"title": "Creating a TCP Listener and Configuring the Health Check Settings"
|
|
85
85
|
},
|
|
86
86
|
{
|
|
87
87
|
"document": "This example shows you how to create an HTTPS listener and bind a new certificate.",
|
|
88
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n
|
|
89
|
-
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-
|
|
88
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"Protocol\": \"HTTPS\",\n \"Ports\": [\n 7573\n ],\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertContent\": \"-----BEGINCERTIFICATE-----\\\\nxxxxxxxxxxxxxxxxxxxxxxx\\\\n-----ENDCERTIFICATE-----\",\n \"CertName\": \"my-cert\",\n \"CertKey\": \"-----BEGINRSAPRIVATEKEY-----\\\\nxxxxxxxxxxxxxxxxxxxxxxxx\\\\n-----ENDRSAPRIVATEKEY-----\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
|
|
89
|
+
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-bzfmg9m6\"\n ],\n \"RequestId\": \"6082314c-030c-429d-9eae-2dc6b159b5b9\"\n }\n}",
|
|
90
90
|
"title": "Creating an HTTPS Listener and Binding a New Certificate"
|
|
91
91
|
},
|
|
92
92
|
{
|
|
93
93
|
"document": "This example shows you how to create a UDP listener with the default Ping health check.",
|
|
94
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n
|
|
94
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"HealthCheck\": {\n \"HealthSwitch\": \"1\"\n },\n \"Protocol\": \"UDP\",\n \"ListenerNames\": [\n \"lis_test\"\n ],\n \"Ports\": [\n 432\n ],\n \"LoadBalancerId\": \"lb-6wlxe9rj\"\n}",
|
|
95
95
|
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-aev333n1\"\n ],\n \"RequestId\": \"3b81f03e-6088-448d-abaf-8a487d4f985a\"\n }\n}",
|
|
96
96
|
"title": "Creating a UDP Listener with the Default Ping Health Check"
|
|
97
97
|
},
|
|
98
98
|
{
|
|
99
99
|
"document": "This example shows you how to create two TCP listeners (respectively named lis0 and lis1) to respectively listen on ports 7569 and 7570.",
|
|
100
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n
|
|
100
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateListener\n<Common request parameters>\n\n{\n \"ListenerNames\": [\n \"lis1\",\n \"lis0\"\n ],\n \"Protocol\": \"TCP\",\n \"Ports\": [\n 7570,\n 7569\n ],\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
|
|
101
101
|
"output": "{\n \"Response\": {\n \"ListenerIds\": [\n \"lbl-d1ubsydq\",\n \"lbl-4udz130k\"\n ],\n \"RequestId\": \"8f272cef-14ff-458c-b67e-1bd21bd2942b\"\n }\n}",
|
|
102
102
|
"title": "Creating Two TCP Listeners (Respectively Named lis0 and lis1) to Respectively Listen on Ports 7569 and 7570"
|
|
103
103
|
}
|
|
@@ -627,13 +627,13 @@
|
|
|
627
627
|
"ModifyListener": [
|
|
628
628
|
{
|
|
629
629
|
"document": "This example shows you how to modify the certificate bound to an HTTPS listener.",
|
|
630
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n
|
|
630
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n{\n \"ListenerId\": \"lbl-4fbxq45k\",\n \"Certificate\": {\n \"SSLMode\": \"UNIDIRECTIONAL\",\n \"CertId\": \"Nb1DY3hQ\"\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\"\n}",
|
|
631
631
|
"output": "{\n \"Response\": {\n \"RequestId\": \"b64574f9-5bc7-4a63-a9d7-3671b6a6d62b\"\n }\n}",
|
|
632
632
|
"title": "Modifying the Certificate Bound to an HTTPS Listener"
|
|
633
633
|
},
|
|
634
634
|
{
|
|
635
635
|
"document": "This example shows you how to modify the name, health check parameters, and forwarding policy of a TCP listener.",
|
|
636
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n
|
|
636
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyListener\n<Common request parameters>\n\n{\n \"HealthCheck\": {\n \"UnHealthNum\": 5,\n \"HealthNum\": 5,\n \"IntervalTime\": 60,\n \"TimeOut\": 35,\n \"HealthSwitch\": 1\n },\n \"LoadBalancerId\": \"lb-cuxw2rm0\",\n \"ListenerId\": \"lbl-d1ubsydq\",\n \"ListenerName\": \"newlis\",\n \"Scheduler\": \"LEAST_CONN\",\n \"SessionExpireTime\": 120\n}",
|
|
637
637
|
"output": "{\n \"Response\": {\n \"RequestId\": \"8cd88c83-fd30-47c0-8e7a-89bf13a7a83c\"\n }\n}",
|
|
638
638
|
"title": "Modifying the Name, Health Check Parameters, and Forwarding Policy of a TCP Listener"
|
|
639
639
|
}
|
|
@@ -648,10 +648,10 @@
|
|
|
648
648
|
],
|
|
649
649
|
"ModifyLoadBalancerSla": [
|
|
650
650
|
{
|
|
651
|
-
"document": "
|
|
652
|
-
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyLoadBalancerSla\n<Common request
|
|
651
|
+
"document": "When upgrading a pay-as-you-go shared instance to a performance capacity instance, or adjusting the specifications of a performance capacity instance, the final instance specification is determined by the SlaType value set as needed.",
|
|
652
|
+
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyLoadBalancerSla\n<Common request params>\n\n{\n \"LoadBalancerSla\": [\n {\n \"SlaType\": \"clb.c3.medium\",\n \"LoadBalancerId\": \"lb-db2n****\"\n }\n ]\n}",
|
|
653
653
|
"output": "{\n \"Response\": {\n \"RequestId\": \"c1157c81-f3dc-4f2a-9346-76f161d548eb\"\n }\n}",
|
|
654
|
-
"title": "
|
|
654
|
+
"title": "Loadbalancer specification adjustment"
|
|
655
655
|
}
|
|
656
656
|
],
|
|
657
657
|
"ModifyLoadBalancersProject": [
|
|
@@ -808,7 +808,7 @@
|
|
|
808
808
|
{
|
|
809
809
|
"document": "This example shows you how to enable or disable a CLB instance.",
|
|
810
810
|
"input": "POST / HTTP/1.1\nHost: clb.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: SetLoadBalancerStartStatus\n<Common request parameters>\n\n\n\n{\n \"LoadBalancerId\": \"lb-xxxxxxxx\",\n \"OperationType\": \"Stop\"\n}",
|
|
811
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"
|
|
811
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"b3196d4c-2722-4893-8d86-e33136199469\"\n }\n}",
|
|
812
812
|
"title": "Enabling or Disabling a CLB Instance"
|
|
813
813
|
}
|
|
814
814
|
],
|
|
@@ -27,7 +27,10 @@ def doModifyAuditTrack(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doModifyAuditTrack(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDescribeAuditTracks(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDescribeAuditTracks(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doDescribeAuditTrack(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doDescribeAuditTrack(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doGetAttributeKey(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doGetAttributeKey(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doCreateAuditTrack(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doCreateAuditTrack(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doListCmqEnableRegion(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doListCmqEnableRegion(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doDeleteAuditTrack(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doDeleteAuditTrack(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doDeleteAudit(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doDeleteAudit(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doDescribeEvents(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doDescribeEvents(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +522,10 @@ def doStopLogging(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,7 +537,7 @@ def doStopLogging(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +577,10 @@ def doStartLogging(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,7 +592,7 @@ def doStartLogging(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +632,10 @@ def doInquireAuditCredit(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,7 +647,7 @@ def doInquireAuditCredit(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +687,10 @@ def doUpdateAudit(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,7 +702,7 @@ def doUpdateAudit(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +742,10 @@ def doDescribeAudit(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,7 +757,7 @@ def doDescribeAudit(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +797,10 @@ def doCreateAudit(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,7 +812,7 @@ def doCreateAudit(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +852,10 @@ def doListCosEnableRegion(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,7 +867,7 @@ def doListCosEnableRegion(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +907,10 @@ def doLookUpEvents(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,7 +922,7 @@ def doLookUpEvents(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +962,10 @@ def doListAudits(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,7 +977,7 @@ def doListAudits(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|