tccli-intl-en 3.0.1265.1__py2.py3-none-any.whl → 3.1.1.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/services/__init__.py +5 -1
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/bi_client.py +120 -48
- tccli/services/billing/billing_client.py +210 -84
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +515 -146
- tccli/services/ccc/v20200210/api.json +511 -27
- tccli/services/ccc/v20200210/examples.json +24 -0
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +5 -2
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +629 -131
- tccli/services/ckafka/v20190819/api.json +2749 -1470
- tccli/services/ckafka/v20190819/examples.json +209 -155
- tccli/services/clb/clb_client.py +415 -166
- tccli/services/clb/v20180317/api.json +1022 -647
- tccli/services/clb/v20180317/examples.json +19 -19
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +5 -2
- tccli/services/csip/csip_client.py +170 -68
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +420 -168
- tccli/services/cvm/v20170312/api.json +280 -174
- tccli/services/cvm/v20170312/examples.json +116 -116
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +1887 -577
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +808 -216
- tccli/services/dlc/v20210125/api.json +534 -13
- tccli/services/dlc/v20210125/examples.json +40 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +200 -80
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +385 -154
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/examples.json +2 -2
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +370 -148
- tccli/services/live/live_client.py +600 -240
- tccli/services/lke/lke_client.py +450 -180
- tccli/services/lkeap/lkeap_client.py +142 -12
- tccli/services/lkeap/v20240522/api.json +263 -0
- tccli/services/lkeap/v20240522/examples.json +35 -1
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +165 -66
- tccli/services/mdl/v20200326/api.json +186 -12
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/mdp_client.py +416 -124
- tccli/services/mdp/v20200527/api.json +146 -14
- tccli/services/mdp/v20200527/examples.json +95 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +369 -58
- tccli/services/mongodb/v20190725/api.json +811 -226
- tccli/services/mongodb/v20190725/examples.json +54 -22
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +657 -8
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +684 -184
- tccli/services/mps/v20190612/api.json +1656 -222
- tccli/services/mps/v20190612/examples.json +60 -10
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +246 -76
- tccli/services/ocr/v20181119/api.json +119 -10
- tccli/services/ocr/v20181119/examples.json +8 -0
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/privatedns/privatedns_client.py +155 -62
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/quota_client.py +229 -2
- tccli/services/quota/v20241204/api.json +451 -2
- tccli/services/quota/v20241204/examples.json +42 -3
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +545 -218
- tccli/services/redis/v20180412/api.json +225 -113
- tccli/services/redis/v20180412/examples.json +19 -19
- tccli/services/region/region_client.py +15 -6
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +145 -58
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +695 -278
- tccli/services/ssl/ssl_client.py +190 -76
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +101 -61
- tccli/services/tcsas/v20250106/examples.json +2 -2
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +470 -188
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +1365 -483
- tccli/services/teo/v20220901/api.json +354 -39
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/tione/tione_client.py +5 -2
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +690 -276
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +255 -102
- tccli/services/trtc/v20190722/api.json +11 -11
- tccli/services/trtc/v20190722/examples.json +7 -7
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/vod_client.py +895 -358
- tccli/services/vpc/v20170312/api.json +970 -75
- tccli/services/vpc/v20170312/examples.json +106 -10
- tccli/services/vpc/vpc_client.py +2159 -644
- tccli/services/waf/waf_client.py +535 -214
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/RECORD +186 -180
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/top_level.txt +0 -0
tccli/services/dlc/dlc_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doCreateTask(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doCreateTask(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doAddUsersToWorkGroup(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doAddUsersToWorkGroup(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doDescribeTaskResult(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doDescribeTaskResult(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doDescribeForbiddenTablePro(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doDescribeForbiddenTablePro(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doDescribeUserRoles(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doDescribeUserRoles(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doModifyUserType(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doModifyUserType(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -381,6 +402,61 @@ def doDescribeWorkGroupInfo(args, parsed_globals):
|
|
|
381
402
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
403
|
|
|
383
404
|
|
|
405
|
+
def doDescribeDataMaskStrategies(args, parsed_globals):
|
|
406
|
+
g_param = parse_global_arg(parsed_globals)
|
|
407
|
+
|
|
408
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
409
|
+
cred = credential.CVMRoleCredential()
|
|
410
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
411
|
+
cred = credential.STSAssumeRoleCredential(
|
|
412
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
413
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
414
|
+
)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
419
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
420
|
+
else:
|
|
421
|
+
cred = credential.Credential(
|
|
422
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
423
|
+
)
|
|
424
|
+
http_profile = HttpProfile(
|
|
425
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
426
|
+
reqMethod="POST",
|
|
427
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
428
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
429
|
+
)
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
431
|
+
if g_param[OptionsDefine.Language]:
|
|
432
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
433
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
434
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
435
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
436
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
437
|
+
model = models.DescribeDataMaskStrategiesRequest()
|
|
438
|
+
model.from_json_string(json.dumps(args))
|
|
439
|
+
start_time = time.time()
|
|
440
|
+
while True:
|
|
441
|
+
rsp = client.DescribeDataMaskStrategies(model)
|
|
442
|
+
result = rsp.to_json_string()
|
|
443
|
+
try:
|
|
444
|
+
json_obj = json.loads(result)
|
|
445
|
+
except TypeError as e:
|
|
446
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
447
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
448
|
+
break
|
|
449
|
+
cur_time = time.time()
|
|
450
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
451
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
452
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
453
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
454
|
+
else:
|
|
455
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
456
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
457
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
458
|
+
|
|
459
|
+
|
|
384
460
|
def doDeleteWorkGroup(args, parsed_globals):
|
|
385
461
|
g_param = parse_global_arg(parsed_globals)
|
|
386
462
|
|
|
@@ -391,7 +467,10 @@ def doDeleteWorkGroup(args, parsed_globals):
|
|
|
391
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
469
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
475
|
else:
|
|
397
476
|
cred = credential.Credential(
|
|
@@ -403,7 +482,7 @@ def doDeleteWorkGroup(args, parsed_globals):
|
|
|
403
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
484
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
486
|
if g_param[OptionsDefine.Language]:
|
|
408
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +522,10 @@ def doDescribeDataEngine(args, parsed_globals):
|
|
|
443
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
524
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
530
|
else:
|
|
449
531
|
cred = credential.Credential(
|
|
@@ -455,7 +537,7 @@ def doDescribeDataEngine(args, parsed_globals):
|
|
|
455
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
539
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
541
|
if g_param[OptionsDefine.Language]:
|
|
460
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +577,10 @@ def doCreateStoreLocation(args, parsed_globals):
|
|
|
495
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
579
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
585
|
else:
|
|
501
586
|
cred = credential.Credential(
|
|
@@ -507,7 +592,7 @@ def doCreateStoreLocation(args, parsed_globals):
|
|
|
507
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
594
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
596
|
if g_param[OptionsDefine.Language]:
|
|
512
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +632,10 @@ def doSwitchDataEngine(args, parsed_globals):
|
|
|
547
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
634
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
640
|
else:
|
|
553
641
|
cred = credential.Credential(
|
|
@@ -559,7 +647,7 @@ def doSwitchDataEngine(args, parsed_globals):
|
|
|
559
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
649
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
651
|
if g_param[OptionsDefine.Language]:
|
|
564
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +687,10 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
|
|
|
599
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
689
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
695
|
else:
|
|
605
696
|
cred = credential.Credential(
|
|
@@ -611,7 +702,7 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
|
|
|
611
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
704
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
706
|
if g_param[OptionsDefine.Language]:
|
|
616
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -641,6 +732,61 @@ def doDescribeSparkSessionBatchSqlLog(args, parsed_globals):
|
|
|
641
732
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
733
|
|
|
643
734
|
|
|
735
|
+
def doDeleteDataMaskStrategy(args, parsed_globals):
|
|
736
|
+
g_param = parse_global_arg(parsed_globals)
|
|
737
|
+
|
|
738
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
739
|
+
cred = credential.CVMRoleCredential()
|
|
740
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
741
|
+
cred = credential.STSAssumeRoleCredential(
|
|
742
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
743
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
744
|
+
)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
749
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
750
|
+
else:
|
|
751
|
+
cred = credential.Credential(
|
|
752
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
753
|
+
)
|
|
754
|
+
http_profile = HttpProfile(
|
|
755
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
756
|
+
reqMethod="POST",
|
|
757
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
758
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
759
|
+
)
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
761
|
+
if g_param[OptionsDefine.Language]:
|
|
762
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
763
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
764
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
765
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
766
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
767
|
+
model = models.DeleteDataMaskStrategyRequest()
|
|
768
|
+
model.from_json_string(json.dumps(args))
|
|
769
|
+
start_time = time.time()
|
|
770
|
+
while True:
|
|
771
|
+
rsp = client.DeleteDataMaskStrategy(model)
|
|
772
|
+
result = rsp.to_json_string()
|
|
773
|
+
try:
|
|
774
|
+
json_obj = json.loads(result)
|
|
775
|
+
except TypeError as e:
|
|
776
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
777
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
778
|
+
break
|
|
779
|
+
cur_time = time.time()
|
|
780
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
781
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
782
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
783
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
784
|
+
else:
|
|
785
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
786
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
787
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
788
|
+
|
|
789
|
+
|
|
644
790
|
def doDescribeDLCCatalogAccess(args, parsed_globals):
|
|
645
791
|
g_param = parse_global_arg(parsed_globals)
|
|
646
792
|
|
|
@@ -651,7 +797,10 @@ def doDescribeDLCCatalogAccess(args, parsed_globals):
|
|
|
651
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
799
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
805
|
else:
|
|
657
806
|
cred = credential.Credential(
|
|
@@ -663,7 +812,7 @@ def doDescribeDLCCatalogAccess(args, parsed_globals):
|
|
|
663
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
814
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
816
|
if g_param[OptionsDefine.Language]:
|
|
668
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +852,10 @@ def doDescribeUserType(args, parsed_globals):
|
|
|
703
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
854
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
860
|
else:
|
|
709
861
|
cred = credential.Credential(
|
|
@@ -715,7 +867,7 @@ def doDescribeUserType(args, parsed_globals):
|
|
|
715
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
869
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
871
|
if g_param[OptionsDefine.Language]:
|
|
720
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +907,10 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
755
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
909
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
915
|
else:
|
|
761
916
|
cred = credential.Credential(
|
|
@@ -767,7 +922,7 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
767
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
924
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
926
|
if g_param[OptionsDefine.Language]:
|
|
772
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +962,10 @@ def doDescribeTaskStatistics(args, parsed_globals):
|
|
|
807
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
964
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
970
|
else:
|
|
813
971
|
cred = credential.Credential(
|
|
@@ -819,7 +977,7 @@ def doDescribeTaskStatistics(args, parsed_globals):
|
|
|
819
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
979
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
981
|
if g_param[OptionsDefine.Language]:
|
|
824
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +1017,10 @@ def doSwitchDataEngineImage(args, parsed_globals):
|
|
|
859
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
1019
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
1025
|
else:
|
|
865
1026
|
cred = credential.Credential(
|
|
@@ -871,7 +1032,7 @@ def doSwitchDataEngineImage(args, parsed_globals):
|
|
|
871
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
1034
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
1036
|
if g_param[OptionsDefine.Language]:
|
|
876
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +1072,10 @@ def doCreateSparkAppTask(args, parsed_globals):
|
|
|
911
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1074
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1080
|
else:
|
|
917
1081
|
cred = credential.Credential(
|
|
@@ -923,7 +1087,7 @@ def doCreateSparkAppTask(args, parsed_globals):
|
|
|
923
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
1089
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
1091
|
if g_param[OptionsDefine.Language]:
|
|
928
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1127,10 @@ def doDropDLCTable(args, parsed_globals):
|
|
|
963
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1129
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1135
|
else:
|
|
969
1136
|
cred = credential.Credential(
|
|
@@ -975,7 +1142,7 @@ def doDropDLCTable(args, parsed_globals):
|
|
|
975
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1144
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1146
|
if g_param[OptionsDefine.Language]:
|
|
980
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1182,10 @@ def doDescribeOtherCHDFSBindingList(args, parsed_globals):
|
|
|
1015
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1184
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1190
|
else:
|
|
1021
1191
|
cred = credential.Credential(
|
|
@@ -1027,7 +1197,7 @@ def doDescribeOtherCHDFSBindingList(args, parsed_globals):
|
|
|
1027
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1199
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1201
|
if g_param[OptionsDefine.Language]:
|
|
1032
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1237,10 @@ def doDescribeLakeFsDirSummary(args, parsed_globals):
|
|
|
1067
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1239
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1245
|
else:
|
|
1073
1246
|
cred = credential.Credential(
|
|
@@ -1079,7 +1252,7 @@ def doDescribeLakeFsDirSummary(args, parsed_globals):
|
|
|
1079
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1254
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1256
|
if g_param[OptionsDefine.Language]:
|
|
1084
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1119,7 +1292,10 @@ def doCheckGrantedPermission(args, parsed_globals):
|
|
|
1119
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1294
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1300
|
else:
|
|
1125
1301
|
cred = credential.Credential(
|
|
@@ -1131,7 +1307,7 @@ def doCheckGrantedPermission(args, parsed_globals):
|
|
|
1131
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1309
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1311
|
if g_param[OptionsDefine.Language]:
|
|
1136
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1347,10 @@ def doRevokeDLCCatalogAccess(args, parsed_globals):
|
|
|
1171
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1349
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1355
|
else:
|
|
1177
1356
|
cred = credential.Credential(
|
|
@@ -1183,7 +1362,7 @@ def doRevokeDLCCatalogAccess(args, parsed_globals):
|
|
|
1183
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1364
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1366
|
if g_param[OptionsDefine.Language]:
|
|
1188
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1402,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
1223
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1404
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1410
|
else:
|
|
1229
1411
|
cred = credential.Credential(
|
|
@@ -1235,7 +1417,7 @@ def doCreateUser(args, parsed_globals):
|
|
|
1235
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1419
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1421
|
if g_param[OptionsDefine.Language]:
|
|
1240
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1265,6 +1447,61 @@ def doCreateUser(args, parsed_globals):
|
|
|
1265
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1448
|
|
|
1267
1449
|
|
|
1450
|
+
def doDescribeSparkAppTasks(args, parsed_globals):
|
|
1451
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1452
|
+
|
|
1453
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1454
|
+
cred = credential.CVMRoleCredential()
|
|
1455
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1456
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1457
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1458
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1459
|
+
)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1464
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1465
|
+
else:
|
|
1466
|
+
cred = credential.Credential(
|
|
1467
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1468
|
+
)
|
|
1469
|
+
http_profile = HttpProfile(
|
|
1470
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1471
|
+
reqMethod="POST",
|
|
1472
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1473
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1474
|
+
)
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1476
|
+
if g_param[OptionsDefine.Language]:
|
|
1477
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1478
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1479
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1480
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1481
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1482
|
+
model = models.DescribeSparkAppTasksRequest()
|
|
1483
|
+
model.from_json_string(json.dumps(args))
|
|
1484
|
+
start_time = time.time()
|
|
1485
|
+
while True:
|
|
1486
|
+
rsp = client.DescribeSparkAppTasks(model)
|
|
1487
|
+
result = rsp.to_json_string()
|
|
1488
|
+
try:
|
|
1489
|
+
json_obj = json.loads(result)
|
|
1490
|
+
except TypeError as e:
|
|
1491
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1492
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1493
|
+
break
|
|
1494
|
+
cur_time = time.time()
|
|
1495
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1496
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1497
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1498
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1499
|
+
else:
|
|
1500
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1501
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1502
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1503
|
+
|
|
1504
|
+
|
|
1268
1505
|
def doDescribeDataEngineImageVersions(args, parsed_globals):
|
|
1269
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1507
|
|
|
@@ -1275,7 +1512,10 @@ def doDescribeDataEngineImageVersions(args, parsed_globals):
|
|
|
1275
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1514
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1520
|
else:
|
|
1281
1521
|
cred = credential.Credential(
|
|
@@ -1287,7 +1527,7 @@ def doDescribeDataEngineImageVersions(args, parsed_globals):
|
|
|
1287
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1529
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1531
|
if g_param[OptionsDefine.Language]:
|
|
1292
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1567,10 @@ def doDescribeAdvancedStoreLocation(args, parsed_globals):
|
|
|
1327
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1569
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1575
|
else:
|
|
1333
1576
|
cred = credential.Credential(
|
|
@@ -1339,7 +1582,7 @@ def doDescribeAdvancedStoreLocation(args, parsed_globals):
|
|
|
1339
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1584
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1586
|
if g_param[OptionsDefine.Language]:
|
|
1344
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1622,10 @@ def doDescribeSparkAppJobs(args, parsed_globals):
|
|
|
1379
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1624
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1630
|
else:
|
|
1385
1631
|
cred = credential.Credential(
|
|
@@ -1391,7 +1637,7 @@ def doDescribeSparkAppJobs(args, parsed_globals):
|
|
|
1391
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1639
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1641
|
if g_param[OptionsDefine.Language]:
|
|
1396
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1677,10 @@ def doDescribeUsers(args, parsed_globals):
|
|
|
1431
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1679
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1685
|
else:
|
|
1437
1686
|
cred = credential.Credential(
|
|
@@ -1443,7 +1692,7 @@ def doDescribeUsers(args, parsed_globals):
|
|
|
1443
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1694
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1696
|
if g_param[OptionsDefine.Language]:
|
|
1448
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1732,10 @@ def doCreateTasks(args, parsed_globals):
|
|
|
1483
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1734
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1740
|
else:
|
|
1489
1741
|
cred = credential.Credential(
|
|
@@ -1495,7 +1747,7 @@ def doCreateTasks(args, parsed_globals):
|
|
|
1495
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1749
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1751
|
if g_param[OptionsDefine.Language]:
|
|
1500
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1787,10 @@ def doDescribeDMSDatabaseList(args, parsed_globals):
|
|
|
1535
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1789
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1795
|
else:
|
|
1541
1796
|
cred = credential.Credential(
|
|
@@ -1547,7 +1802,7 @@ def doDescribeDMSDatabaseList(args, parsed_globals):
|
|
|
1547
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1804
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1806
|
if g_param[OptionsDefine.Language]:
|
|
1552
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1842,10 @@ def doModifyWorkGroup(args, parsed_globals):
|
|
|
1587
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1844
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1850
|
else:
|
|
1593
1851
|
cred = credential.Credential(
|
|
@@ -1599,7 +1857,7 @@ def doModifyWorkGroup(args, parsed_globals):
|
|
|
1599
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1859
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1861
|
if g_param[OptionsDefine.Language]:
|
|
1604
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1897,10 @@ def doDescribeTablesName(args, parsed_globals):
|
|
|
1639
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1899
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1905
|
else:
|
|
1645
1906
|
cred = credential.Credential(
|
|
@@ -1651,7 +1912,7 @@ def doDescribeTablesName(args, parsed_globals):
|
|
|
1651
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1914
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1916
|
if g_param[OptionsDefine.Language]:
|
|
1656
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1952,10 @@ def doDeleteCHDFSBindingProduct(args, parsed_globals):
|
|
|
1691
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1954
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1960
|
else:
|
|
1697
1961
|
cred = credential.Credential(
|
|
@@ -1703,7 +1967,7 @@ def doDeleteCHDFSBindingProduct(args, parsed_globals):
|
|
|
1703
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1969
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1971
|
if g_param[OptionsDefine.Language]:
|
|
1708
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +2007,10 @@ def doDescribeUpdatableDataEngines(args, parsed_globals):
|
|
|
1743
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2009
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2015
|
else:
|
|
1749
2016
|
cred = credential.Credential(
|
|
@@ -1755,7 +2022,7 @@ def doDescribeUpdatableDataEngines(args, parsed_globals):
|
|
|
1755
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
2024
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
2026
|
if g_param[OptionsDefine.Language]:
|
|
1760
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +2062,10 @@ def doCreateInternalTable(args, parsed_globals):
|
|
|
1795
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2064
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2070
|
else:
|
|
1801
2071
|
cred = credential.Credential(
|
|
@@ -1807,7 +2077,7 @@ def doCreateInternalTable(args, parsed_globals):
|
|
|
1807
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
2079
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
2081
|
if g_param[OptionsDefine.Language]:
|
|
1812
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +2117,10 @@ def doGenerateCreateMangedTableSql(args, parsed_globals):
|
|
|
1847
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2119
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2125
|
else:
|
|
1853
2126
|
cred = credential.Credential(
|
|
@@ -1859,7 +2132,7 @@ def doGenerateCreateMangedTableSql(args, parsed_globals):
|
|
|
1859
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2134
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2136
|
if g_param[OptionsDefine.Language]:
|
|
1864
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2172,10 @@ def doAttachWorkGroupPolicy(args, parsed_globals):
|
|
|
1899
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2174
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2180
|
else:
|
|
1905
2181
|
cred = credential.Credential(
|
|
@@ -1911,7 +2187,7 @@ def doAttachWorkGroupPolicy(args, parsed_globals):
|
|
|
1911
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2189
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2191
|
if g_param[OptionsDefine.Language]:
|
|
1916
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +2227,10 @@ def doDescribeDataEnginesScaleDetail(args, parsed_globals):
|
|
|
1951
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2229
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2235
|
else:
|
|
1957
2236
|
cred = credential.Credential(
|
|
@@ -1963,7 +2242,7 @@ def doDescribeDataEnginesScaleDetail(args, parsed_globals):
|
|
|
1963
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2244
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2246
|
if g_param[OptionsDefine.Language]:
|
|
1968
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2282,10 @@ def doCreateSparkApp(args, parsed_globals):
|
|
|
2003
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2284
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2290
|
else:
|
|
2009
2291
|
cred = credential.Credential(
|
|
@@ -2015,7 +2297,7 @@ def doCreateSparkApp(args, parsed_globals):
|
|
|
2015
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2299
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2301
|
if g_param[OptionsDefine.Language]:
|
|
2020
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2337,10 @@ def doDescribeThirdPartyAccessUser(args, parsed_globals):
|
|
|
2055
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2339
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2345
|
else:
|
|
2061
2346
|
cred = credential.Credential(
|
|
@@ -2067,7 +2352,7 @@ def doDescribeThirdPartyAccessUser(args, parsed_globals):
|
|
|
2067
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2354
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2356
|
if g_param[OptionsDefine.Language]:
|
|
2072
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2392,10 @@ def doRollbackDataEngineImage(args, parsed_globals):
|
|
|
2107
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2394
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2400
|
else:
|
|
2113
2401
|
cred = credential.Credential(
|
|
@@ -2119,7 +2407,7 @@ def doRollbackDataEngineImage(args, parsed_globals):
|
|
|
2119
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2409
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2411
|
if g_param[OptionsDefine.Language]:
|
|
2124
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2447,10 @@ def doDescribeSessionImageVersion(args, parsed_globals):
|
|
|
2159
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2449
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2455
|
else:
|
|
2165
2456
|
cred = credential.Credential(
|
|
@@ -2171,7 +2462,7 @@ def doDescribeSessionImageVersion(args, parsed_globals):
|
|
|
2171
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2464
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2466
|
if g_param[OptionsDefine.Language]:
|
|
2176
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2502,10 @@ def doDescribeSubUserAccessPolicy(args, parsed_globals):
|
|
|
2211
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2504
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2510
|
else:
|
|
2217
2511
|
cred = credential.Credential(
|
|
@@ -2223,7 +2517,7 @@ def doDescribeSubUserAccessPolicy(args, parsed_globals):
|
|
|
2223
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2519
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2521
|
if g_param[OptionsDefine.Language]:
|
|
2228
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2557,10 @@ def doDescribeDLCTableList(args, parsed_globals):
|
|
|
2263
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2559
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2565
|
else:
|
|
2269
2566
|
cred = credential.Credential(
|
|
@@ -2275,7 +2572,7 @@ def doDescribeDLCTableList(args, parsed_globals):
|
|
|
2275
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2574
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2576
|
if g_param[OptionsDefine.Language]:
|
|
2280
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2612,10 @@ def doCreateSparkSessionBatchSQL(args, parsed_globals):
|
|
|
2315
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2614
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2620
|
else:
|
|
2321
2621
|
cred = credential.Credential(
|
|
@@ -2327,7 +2627,7 @@ def doCreateSparkSessionBatchSQL(args, parsed_globals):
|
|
|
2327
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2629
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2631
|
if g_param[OptionsDefine.Language]:
|
|
2332
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2667,10 @@ def doCreateDLCTable(args, parsed_globals):
|
|
|
2367
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2669
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2675
|
else:
|
|
2373
2676
|
cred = credential.Credential(
|
|
@@ -2379,7 +2682,7 @@ def doCreateDLCTable(args, parsed_globals):
|
|
|
2379
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2684
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2686
|
if g_param[OptionsDefine.Language]:
|
|
2384
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2722,10 @@ def doGrantDLCCatalogAccess(args, parsed_globals):
|
|
|
2419
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2724
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2730
|
else:
|
|
2425
2731
|
cred = credential.Credential(
|
|
@@ -2431,7 +2737,7 @@ def doGrantDLCCatalogAccess(args, parsed_globals):
|
|
|
2431
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2739
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2741
|
if g_param[OptionsDefine.Language]:
|
|
2436
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2777,10 @@ def doDescribeQuery(args, parsed_globals):
|
|
|
2471
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2779
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2785
|
else:
|
|
2477
2786
|
cred = credential.Credential(
|
|
@@ -2483,7 +2792,7 @@ def doDescribeQuery(args, parsed_globals):
|
|
|
2483
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2794
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2796
|
if g_param[OptionsDefine.Language]:
|
|
2488
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2832,10 @@ def doDescribeDLCTable(args, parsed_globals):
|
|
|
2523
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2834
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2840
|
else:
|
|
2529
2841
|
cred = credential.Credential(
|
|
@@ -2535,7 +2847,7 @@ def doDescribeDLCTable(args, parsed_globals):
|
|
|
2535
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2849
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2851
|
if g_param[OptionsDefine.Language]:
|
|
2540
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2887,10 @@ def doSuspendResumeDataEngine(args, parsed_globals):
|
|
|
2575
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2889
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2895
|
else:
|
|
2581
2896
|
cred = credential.Credential(
|
|
@@ -2587,7 +2902,7 @@ def doSuspendResumeDataEngine(args, parsed_globals):
|
|
|
2587
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2904
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2906
|
if g_param[OptionsDefine.Language]:
|
|
2592
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2942,10 @@ def doCreateDMSDatabase(args, parsed_globals):
|
|
|
2627
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2944
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2950
|
else:
|
|
2633
2951
|
cred = credential.Credential(
|
|
@@ -2639,7 +2957,7 @@ def doCreateDMSDatabase(args, parsed_globals):
|
|
|
2639
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2959
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2961
|
if g_param[OptionsDefine.Language]:
|
|
2644
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2997,10 @@ def doAttachUserPolicy(args, parsed_globals):
|
|
|
2679
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2999
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3005
|
else:
|
|
2685
3006
|
cred = credential.Credential(
|
|
@@ -2691,7 +3012,7 @@ def doAttachUserPolicy(args, parsed_globals):
|
|
|
2691
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
3014
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
3016
|
if g_param[OptionsDefine.Language]:
|
|
2696
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +3052,10 @@ def doCopyDLCTable(args, parsed_globals):
|
|
|
2731
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3054
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3060
|
else:
|
|
2737
3061
|
cred = credential.Credential(
|
|
@@ -2743,7 +3067,7 @@ def doCopyDLCTable(args, parsed_globals):
|
|
|
2743
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3069
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3071
|
if g_param[OptionsDefine.Language]:
|
|
2748
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +3107,10 @@ def doCreateResultDownload(args, parsed_globals):
|
|
|
2783
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3109
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3115
|
else:
|
|
2789
3116
|
cred = credential.Credential(
|
|
@@ -2795,7 +3122,7 @@ def doCreateResultDownload(args, parsed_globals):
|
|
|
2795
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3124
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3126
|
if g_param[OptionsDefine.Language]:
|
|
2800
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +3162,10 @@ def doModifyAdvancedStoreLocation(args, parsed_globals):
|
|
|
2835
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3164
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3170
|
else:
|
|
2841
3171
|
cred = credential.Credential(
|
|
@@ -2847,7 +3177,7 @@ def doModifyAdvancedStoreLocation(args, parsed_globals):
|
|
|
2847
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3179
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3181
|
if g_param[OptionsDefine.Language]:
|
|
2852
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +3217,10 @@ def doAlterDMSDatabase(args, parsed_globals):
|
|
|
2887
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3219
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3225
|
else:
|
|
2893
3226
|
cred = credential.Credential(
|
|
@@ -2899,7 +3232,7 @@ def doAlterDMSDatabase(args, parsed_globals):
|
|
|
2899
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3234
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3236
|
if g_param[OptionsDefine.Language]:
|
|
2904
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3272,10 @@ def doDropDMSDatabase(args, parsed_globals):
|
|
|
2939
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3274
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3280
|
else:
|
|
2945
3281
|
cred = credential.Credential(
|
|
@@ -2951,7 +3287,7 @@ def doDropDMSDatabase(args, parsed_globals):
|
|
|
2951
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3289
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3291
|
if g_param[OptionsDefine.Language]:
|
|
2956
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3327,10 @@ def doUpdateUserDataEngineConfig(args, parsed_globals):
|
|
|
2991
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3329
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3335
|
else:
|
|
2997
3336
|
cred = credential.Credential(
|
|
@@ -3003,7 +3342,7 @@ def doUpdateUserDataEngineConfig(args, parsed_globals):
|
|
|
3003
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3344
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3346
|
if g_param[OptionsDefine.Language]:
|
|
3008
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3382,10 @@ def doModifySparkAppBatch(args, parsed_globals):
|
|
|
3043
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3384
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3390
|
else:
|
|
3049
3391
|
cred = credential.Credential(
|
|
@@ -3055,7 +3397,7 @@ def doModifySparkAppBatch(args, parsed_globals):
|
|
|
3055
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3399
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3401
|
if g_param[OptionsDefine.Language]:
|
|
3060
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3437,10 @@ def doCheckDataEngineImageCanBeUpgrade(args, parsed_globals):
|
|
|
3095
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3439
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3445
|
else:
|
|
3101
3446
|
cred = credential.Credential(
|
|
@@ -3107,7 +3452,7 @@ def doCheckDataEngineImageCanBeUpgrade(args, parsed_globals):
|
|
|
3107
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3454
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3456
|
if g_param[OptionsDefine.Language]:
|
|
3112
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3492,10 @@ def doDeleteSparkApp(args, parsed_globals):
|
|
|
3147
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3494
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3500
|
else:
|
|
3153
3501
|
cred = credential.Credential(
|
|
@@ -3159,7 +3507,7 @@ def doDeleteSparkApp(args, parsed_globals):
|
|
|
3159
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3509
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3511
|
if g_param[OptionsDefine.Language]:
|
|
3164
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3547,10 @@ def doDescribeResultDownload(args, parsed_globals):
|
|
|
3199
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3549
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3555
|
else:
|
|
3205
3556
|
cred = credential.Credential(
|
|
@@ -3211,7 +3562,7 @@ def doDescribeResultDownload(args, parsed_globals):
|
|
|
3211
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3564
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3566
|
if g_param[OptionsDefine.Language]:
|
|
3216
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3602,10 @@ def doQueryTaskCostDetail(args, parsed_globals):
|
|
|
3251
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3604
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3610
|
else:
|
|
3257
3611
|
cred = credential.Credential(
|
|
@@ -3263,7 +3617,7 @@ def doQueryTaskCostDetail(args, parsed_globals):
|
|
|
3263
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3619
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3621
|
if g_param[OptionsDefine.Language]:
|
|
3268
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3657,10 @@ def doCreateWorkGroup(args, parsed_globals):
|
|
|
3303
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3659
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3665
|
else:
|
|
3309
3666
|
cred = credential.Credential(
|
|
@@ -3315,7 +3672,7 @@ def doCreateWorkGroup(args, parsed_globals):
|
|
|
3315
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3674
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3676
|
if g_param[OptionsDefine.Language]:
|
|
3320
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3712,10 @@ def doCreateCHDFSBindingProduct(args, parsed_globals):
|
|
|
3355
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3714
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3720
|
else:
|
|
3361
3721
|
cred = credential.Credential(
|
|
@@ -3367,7 +3727,7 @@ def doCreateCHDFSBindingProduct(args, parsed_globals):
|
|
|
3367
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3729
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3731
|
if g_param[OptionsDefine.Language]:
|
|
3372
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3767,10 @@ def doCheckDataEngineImageCanBeRollback(args, parsed_globals):
|
|
|
3407
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3769
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3775
|
else:
|
|
3413
3776
|
cred = credential.Credential(
|
|
@@ -3419,7 +3782,7 @@ def doCheckDataEngineImageCanBeRollback(args, parsed_globals):
|
|
|
3419
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3784
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3786
|
if g_param[OptionsDefine.Language]:
|
|
3424
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3822,10 @@ def doDescribeJob(args, parsed_globals):
|
|
|
3459
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3824
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3830
|
else:
|
|
3465
3831
|
cred = credential.Credential(
|
|
@@ -3471,7 +3837,7 @@ def doDescribeJob(args, parsed_globals):
|
|
|
3471
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3839
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3841
|
if g_param[OptionsDefine.Language]:
|
|
3476
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +3877,10 @@ def doCancelSparkSessionBatchSQL(args, parsed_globals):
|
|
|
3511
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3879
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3885
|
else:
|
|
3517
3886
|
cred = credential.Credential(
|
|
@@ -3523,7 +3892,7 @@ def doCancelSparkSessionBatchSQL(args, parsed_globals):
|
|
|
3523
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3894
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3896
|
if g_param[OptionsDefine.Language]:
|
|
3528
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +3932,10 @@ def doCancelTask(args, parsed_globals):
|
|
|
3563
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3934
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3940
|
else:
|
|
3569
3941
|
cred = credential.Credential(
|
|
@@ -3575,7 +3947,7 @@ def doCancelTask(args, parsed_globals):
|
|
|
3575
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3949
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3951
|
if g_param[OptionsDefine.Language]:
|
|
3580
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +3987,10 @@ def doModifySparkApp(args, parsed_globals):
|
|
|
3615
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3989
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3995
|
else:
|
|
3621
3996
|
cred = credential.Credential(
|
|
@@ -3627,7 +4002,7 @@ def doModifySparkApp(args, parsed_globals):
|
|
|
3627
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
4004
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
4006
|
if g_param[OptionsDefine.Language]:
|
|
3632
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +4042,10 @@ def doGetOptimizerPolicy(args, parsed_globals):
|
|
|
3667
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
4044
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
4050
|
else:
|
|
3673
4051
|
cred = credential.Credential(
|
|
@@ -3679,7 +4057,7 @@ def doGetOptimizerPolicy(args, parsed_globals):
|
|
|
3679
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
4059
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
4061
|
if g_param[OptionsDefine.Language]:
|
|
3684
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +4097,10 @@ def doDescribeUserInfo(args, parsed_globals):
|
|
|
3719
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4099
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4105
|
else:
|
|
3725
4106
|
cred = credential.Credential(
|
|
@@ -3731,7 +4112,7 @@ def doDescribeUserInfo(args, parsed_globals):
|
|
|
3731
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4114
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4116
|
if g_param[OptionsDefine.Language]:
|
|
3736
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +4152,10 @@ def doUpdateDataEngine(args, parsed_globals):
|
|
|
3771
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4154
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4160
|
else:
|
|
3777
4161
|
cred = credential.Credential(
|
|
@@ -3783,7 +4167,7 @@ def doUpdateDataEngine(args, parsed_globals):
|
|
|
3783
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4169
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4171
|
if g_param[OptionsDefine.Language]:
|
|
3788
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +4207,10 @@ def doCheckDataEngineConfigPairsValidity(args, parsed_globals):
|
|
|
3823
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4209
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4215
|
else:
|
|
3829
4216
|
cred = credential.Credential(
|
|
@@ -3835,7 +4222,7 @@ def doCheckDataEngineConfigPairsValidity(args, parsed_globals):
|
|
|
3835
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4224
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4226
|
if g_param[OptionsDefine.Language]:
|
|
3840
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3875,7 +4262,10 @@ def doDeleteDataEngine(args, parsed_globals):
|
|
|
3875
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4264
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4270
|
else:
|
|
3881
4271
|
cred = credential.Credential(
|
|
@@ -3887,7 +4277,7 @@ def doDeleteDataEngine(args, parsed_globals):
|
|
|
3887
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4279
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4281
|
if g_param[OptionsDefine.Language]:
|
|
3892
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3927,7 +4317,10 @@ def doDeleteUser(args, parsed_globals):
|
|
|
3927
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4319
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4325
|
else:
|
|
3933
4326
|
cred = credential.Credential(
|
|
@@ -3939,7 +4332,7 @@ def doDeleteUser(args, parsed_globals):
|
|
|
3939
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4334
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4336
|
if g_param[OptionsDefine.Language]:
|
|
3944
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3979,7 +4372,10 @@ def doDescribeEngineUsageInfo(args, parsed_globals):
|
|
|
3979
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4374
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4380
|
else:
|
|
3985
4381
|
cred = credential.Credential(
|
|
@@ -3991,7 +4387,7 @@ def doDescribeEngineUsageInfo(args, parsed_globals):
|
|
|
3991
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4389
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4391
|
if g_param[OptionsDefine.Language]:
|
|
3996
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4031,7 +4427,10 @@ def doUpdateDataEngineConfig(args, parsed_globals):
|
|
|
4031
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4429
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4435
|
else:
|
|
4037
4436
|
cred = credential.Credential(
|
|
@@ -4043,7 +4442,7 @@ def doUpdateDataEngineConfig(args, parsed_globals):
|
|
|
4043
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4444
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4446
|
if g_param[OptionsDefine.Language]:
|
|
4048
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4083,7 +4482,10 @@ def doUpdateRowFilter(args, parsed_globals):
|
|
|
4083
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4484
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4490
|
else:
|
|
4089
4491
|
cred = credential.Credential(
|
|
@@ -4095,7 +4497,7 @@ def doUpdateRowFilter(args, parsed_globals):
|
|
|
4095
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4499
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4501
|
if g_param[OptionsDefine.Language]:
|
|
4100
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4135,7 +4537,10 @@ def doUpgradeDataEngineImage(args, parsed_globals):
|
|
|
4135
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4539
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4545
|
else:
|
|
4141
4546
|
cred = credential.Credential(
|
|
@@ -4147,7 +4552,7 @@ def doUpgradeDataEngineImage(args, parsed_globals):
|
|
|
4147
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4554
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4556
|
if g_param[OptionsDefine.Language]:
|
|
4152
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4187,7 +4592,10 @@ def doDetachUserPolicy(args, parsed_globals):
|
|
|
4187
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4594
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4600
|
else:
|
|
4193
4601
|
cred = credential.Credential(
|
|
@@ -4199,7 +4607,7 @@ def doDetachUserPolicy(args, parsed_globals):
|
|
|
4199
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4609
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4611
|
if g_param[OptionsDefine.Language]:
|
|
4204
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4239,7 +4647,10 @@ def doDetachWorkGroupPolicy(args, parsed_globals):
|
|
|
4239
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4649
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4655
|
else:
|
|
4245
4656
|
cred = credential.Credential(
|
|
@@ -4251,7 +4662,7 @@ def doDetachWorkGroupPolicy(args, parsed_globals):
|
|
|
4251
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4664
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4666
|
if g_param[OptionsDefine.Language]:
|
|
4256
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4291,7 +4702,10 @@ def doQueryResult(args, parsed_globals):
|
|
|
4291
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4704
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4710
|
else:
|
|
4297
4711
|
cred = credential.Credential(
|
|
@@ -4303,7 +4717,7 @@ def doQueryResult(args, parsed_globals):
|
|
|
4303
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4719
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4721
|
if g_param[OptionsDefine.Language]:
|
|
4308
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4343,7 +4757,10 @@ def doModifyGovernEventRule(args, parsed_globals):
|
|
|
4343
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4759
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4765
|
else:
|
|
4349
4766
|
cred = credential.Credential(
|
|
@@ -4355,7 +4772,7 @@ def doModifyGovernEventRule(args, parsed_globals):
|
|
|
4355
4772
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4773
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4774
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4776
|
if g_param[OptionsDefine.Language]:
|
|
4360
4777
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4778
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4395,7 +4812,10 @@ def doDescribeJobs(args, parsed_globals):
|
|
|
4395
4812
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4813
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4814
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4820
|
else:
|
|
4401
4821
|
cred = credential.Credential(
|
|
@@ -4407,7 +4827,7 @@ def doDescribeJobs(args, parsed_globals):
|
|
|
4407
4827
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4828
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4829
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4831
|
if g_param[OptionsDefine.Language]:
|
|
4412
4832
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4833
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +4867,10 @@ def doRegisterThirdPartyAccessUser(args, parsed_globals):
|
|
|
4447
4867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4868
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4869
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4874
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4875
|
else:
|
|
4453
4876
|
cred = credential.Credential(
|
|
@@ -4459,7 +4882,7 @@ def doRegisterThirdPartyAccessUser(args, parsed_globals):
|
|
|
4459
4882
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
4883
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
4884
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
4886
|
if g_param[OptionsDefine.Language]:
|
|
4464
4887
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
4888
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4499,7 +4922,10 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
|
|
|
4499
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4924
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4930
|
else:
|
|
4505
4931
|
cred = credential.Credential(
|
|
@@ -4511,7 +4937,7 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
|
|
|
4511
4937
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
4938
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
4939
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
4941
|
if g_param[OptionsDefine.Language]:
|
|
4516
4942
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
4943
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4541,7 +4967,7 @@ def doDeleteUsersFromWorkGroup(args, parsed_globals):
|
|
|
4541
4967
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4542
4968
|
|
|
4543
4969
|
|
|
4544
|
-
def
|
|
4970
|
+
def doCreateDataEngine(args, parsed_globals):
|
|
4545
4971
|
g_param = parse_global_arg(parsed_globals)
|
|
4546
4972
|
|
|
4547
4973
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4551,7 +4977,10 @@ def doDescribeSparkAppTasks(args, parsed_globals):
|
|
|
4551
4977
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
4978
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
4979
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
4984
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
4985
|
else:
|
|
4557
4986
|
cred = credential.Credential(
|
|
@@ -4563,18 +4992,18 @@ def doDescribeSparkAppTasks(args, parsed_globals):
|
|
|
4563
4992
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
4993
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
4994
|
)
|
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4567
4996
|
if g_param[OptionsDefine.Language]:
|
|
4568
4997
|
profile.language = g_param[OptionsDefine.Language]
|
|
4569
4998
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4570
4999
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4571
5000
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4572
5001
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4573
|
-
model = models.
|
|
5002
|
+
model = models.CreateDataEngineRequest()
|
|
4574
5003
|
model.from_json_string(json.dumps(args))
|
|
4575
5004
|
start_time = time.time()
|
|
4576
5005
|
while True:
|
|
4577
|
-
rsp = client.
|
|
5006
|
+
rsp = client.CreateDataEngine(model)
|
|
4578
5007
|
result = rsp.to_json_string()
|
|
4579
5008
|
try:
|
|
4580
5009
|
json_obj = json.loads(result)
|
|
@@ -4603,7 +5032,10 @@ def doUnbindWorkGroupsFromUser(args, parsed_globals):
|
|
|
4603
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
5034
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
5040
|
else:
|
|
4609
5041
|
cred = credential.Credential(
|
|
@@ -4615,7 +5047,7 @@ def doUnbindWorkGroupsFromUser(args, parsed_globals):
|
|
|
4615
5047
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4616
5048
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4617
5049
|
)
|
|
4618
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4619
5051
|
if g_param[OptionsDefine.Language]:
|
|
4620
5052
|
profile.language = g_param[OptionsDefine.Language]
|
|
4621
5053
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4655,7 +5087,10 @@ def doDescribeWorkGroups(args, parsed_globals):
|
|
|
4655
5087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
5088
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
5089
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
5094
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
5095
|
else:
|
|
4661
5096
|
cred = credential.Credential(
|
|
@@ -4667,7 +5102,7 @@ def doDescribeWorkGroups(args, parsed_globals):
|
|
|
4667
5102
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4668
5103
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4669
5104
|
)
|
|
4670
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4671
5106
|
if g_param[OptionsDefine.Language]:
|
|
4672
5107
|
profile.language = g_param[OptionsDefine.Language]
|
|
4673
5108
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4707,7 +5142,10 @@ def doRestartDataEngine(args, parsed_globals):
|
|
|
4707
5142
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4708
5143
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4709
5144
|
)
|
|
4710
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
5149
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
5150
|
else:
|
|
4713
5151
|
cred = credential.Credential(
|
|
@@ -4719,7 +5157,7 @@ def doRestartDataEngine(args, parsed_globals):
|
|
|
4719
5157
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4720
5158
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4721
5159
|
)
|
|
4722
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5160
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4723
5161
|
if g_param[OptionsDefine.Language]:
|
|
4724
5162
|
profile.language = g_param[OptionsDefine.Language]
|
|
4725
5163
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4749,6 +5187,61 @@ def doRestartDataEngine(args, parsed_globals):
|
|
|
4749
5187
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4750
5188
|
|
|
4751
5189
|
|
|
5190
|
+
def doAttachDataMaskPolicy(args, parsed_globals):
|
|
5191
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5192
|
+
|
|
5193
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5194
|
+
cred = credential.CVMRoleCredential()
|
|
5195
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5196
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5197
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5198
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5199
|
+
)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5204
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5205
|
+
else:
|
|
5206
|
+
cred = credential.Credential(
|
|
5207
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5208
|
+
)
|
|
5209
|
+
http_profile = HttpProfile(
|
|
5210
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5211
|
+
reqMethod="POST",
|
|
5212
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5213
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5214
|
+
)
|
|
5215
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5216
|
+
if g_param[OptionsDefine.Language]:
|
|
5217
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5218
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5219
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5220
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5221
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5222
|
+
model = models.AttachDataMaskPolicyRequest()
|
|
5223
|
+
model.from_json_string(json.dumps(args))
|
|
5224
|
+
start_time = time.time()
|
|
5225
|
+
while True:
|
|
5226
|
+
rsp = client.AttachDataMaskPolicy(model)
|
|
5227
|
+
result = rsp.to_json_string()
|
|
5228
|
+
try:
|
|
5229
|
+
json_obj = json.loads(result)
|
|
5230
|
+
except TypeError as e:
|
|
5231
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5232
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5233
|
+
break
|
|
5234
|
+
cur_time = time.time()
|
|
5235
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5236
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5237
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5238
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5239
|
+
else:
|
|
5240
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5241
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5242
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5243
|
+
|
|
5244
|
+
|
|
4752
5245
|
def doRenewDataEngine(args, parsed_globals):
|
|
4753
5246
|
g_param = parse_global_arg(parsed_globals)
|
|
4754
5247
|
|
|
@@ -4759,7 +5252,10 @@ def doRenewDataEngine(args, parsed_globals):
|
|
|
4759
5252
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
5253
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
5254
|
)
|
|
4762
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
5259
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
5260
|
else:
|
|
4765
5261
|
cred = credential.Credential(
|
|
@@ -4771,7 +5267,7 @@ def doRenewDataEngine(args, parsed_globals):
|
|
|
4771
5267
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4772
5268
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4773
5269
|
)
|
|
4774
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5270
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4775
5271
|
if g_param[OptionsDefine.Language]:
|
|
4776
5272
|
profile.language = g_param[OptionsDefine.Language]
|
|
4777
5273
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4811,7 +5307,10 @@ def doDeleteThirdPartyAccessUser(args, parsed_globals):
|
|
|
4811
5307
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4812
5308
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4813
5309
|
)
|
|
4814
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5310
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5311
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5312
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4815
5314
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4816
5315
|
else:
|
|
4817
5316
|
cred = credential.Credential(
|
|
@@ -4823,7 +5322,7 @@ def doDeleteThirdPartyAccessUser(args, parsed_globals):
|
|
|
4823
5322
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4824
5323
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4825
5324
|
)
|
|
4826
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5325
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4827
5326
|
if g_param[OptionsDefine.Language]:
|
|
4828
5327
|
profile.language = g_param[OptionsDefine.Language]
|
|
4829
5328
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4863,7 +5362,10 @@ def doDescribeDMSDatabase(args, parsed_globals):
|
|
|
4863
5362
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4864
5363
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4865
5364
|
)
|
|
4866
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5365
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5366
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5367
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4867
5369
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4868
5370
|
else:
|
|
4869
5371
|
cred = credential.Credential(
|
|
@@ -4875,7 +5377,7 @@ def doDescribeDMSDatabase(args, parsed_globals):
|
|
|
4875
5377
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4876
5378
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4877
5379
|
)
|
|
4878
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5380
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4879
5381
|
if g_param[OptionsDefine.Language]:
|
|
4880
5382
|
profile.language = g_param[OptionsDefine.Language]
|
|
4881
5383
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4915,7 +5417,10 @@ def doBindWorkGroupsToUser(args, parsed_globals):
|
|
|
4915
5417
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4916
5418
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4917
5419
|
)
|
|
4918
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5420
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5421
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5422
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4919
5424
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4920
5425
|
else:
|
|
4921
5426
|
cred = credential.Credential(
|
|
@@ -4927,7 +5432,7 @@ def doBindWorkGroupsToUser(args, parsed_globals):
|
|
|
4927
5432
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4928
5433
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4929
5434
|
)
|
|
4930
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5435
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4931
5436
|
if g_param[OptionsDefine.Language]:
|
|
4932
5437
|
profile.language = g_param[OptionsDefine.Language]
|
|
4933
5438
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4967,7 +5472,10 @@ def doDescribeUserDataEngineConfig(args, parsed_globals):
|
|
|
4967
5472
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4968
5473
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4969
5474
|
)
|
|
4970
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5475
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5476
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5477
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4971
5479
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4972
5480
|
else:
|
|
4973
5481
|
cred = credential.Credential(
|
|
@@ -4979,7 +5487,7 @@ def doDescribeUserDataEngineConfig(args, parsed_globals):
|
|
|
4979
5487
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4980
5488
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4981
5489
|
)
|
|
4982
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5490
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4983
5491
|
if g_param[OptionsDefine.Language]:
|
|
4984
5492
|
profile.language = g_param[OptionsDefine.Language]
|
|
4985
5493
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5019,7 +5527,10 @@ def doModifyUser(args, parsed_globals):
|
|
|
5019
5527
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5020
5528
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5021
5529
|
)
|
|
5022
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5530
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5531
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5532
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5023
5534
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5024
5535
|
else:
|
|
5025
5536
|
cred = credential.Credential(
|
|
@@ -5031,7 +5542,7 @@ def doModifyUser(args, parsed_globals):
|
|
|
5031
5542
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5032
5543
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5033
5544
|
)
|
|
5034
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5545
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5035
5546
|
if g_param[OptionsDefine.Language]:
|
|
5036
5547
|
profile.language = g_param[OptionsDefine.Language]
|
|
5037
5548
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5071,7 +5582,10 @@ def doModifyDataEngineDescription(args, parsed_globals):
|
|
|
5071
5582
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5072
5583
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5073
5584
|
)
|
|
5074
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5585
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5586
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5587
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5075
5589
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5076
5590
|
else:
|
|
5077
5591
|
cred = credential.Credential(
|
|
@@ -5083,7 +5597,7 @@ def doModifyDataEngineDescription(args, parsed_globals):
|
|
|
5083
5597
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5084
5598
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5085
5599
|
)
|
|
5086
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5600
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5087
5601
|
if g_param[OptionsDefine.Language]:
|
|
5088
5602
|
profile.language = g_param[OptionsDefine.Language]
|
|
5089
5603
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5123,7 +5637,10 @@ def doDropDMSTable(args, parsed_globals):
|
|
|
5123
5637
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5124
5638
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5125
5639
|
)
|
|
5126
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5640
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5641
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5642
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5127
5644
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5128
5645
|
else:
|
|
5129
5646
|
cred = credential.Credential(
|
|
@@ -5135,7 +5652,7 @@ def doDropDMSTable(args, parsed_globals):
|
|
|
5135
5652
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5136
5653
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5137
5654
|
)
|
|
5138
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5655
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5139
5656
|
if g_param[OptionsDefine.Language]:
|
|
5140
5657
|
profile.language = g_param[OptionsDefine.Language]
|
|
5141
5658
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5165,6 +5682,61 @@ def doDropDMSTable(args, parsed_globals):
|
|
|
5165
5682
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5166
5683
|
|
|
5167
5684
|
|
|
5685
|
+
def doCreateDataMaskStrategy(args, parsed_globals):
|
|
5686
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5687
|
+
|
|
5688
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5689
|
+
cred = credential.CVMRoleCredential()
|
|
5690
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5691
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5692
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5693
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5694
|
+
)
|
|
5695
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5696
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5697
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5699
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5700
|
+
else:
|
|
5701
|
+
cred = credential.Credential(
|
|
5702
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5703
|
+
)
|
|
5704
|
+
http_profile = HttpProfile(
|
|
5705
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5706
|
+
reqMethod="POST",
|
|
5707
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5708
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5709
|
+
)
|
|
5710
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5711
|
+
if g_param[OptionsDefine.Language]:
|
|
5712
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5713
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5714
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5715
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5716
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5717
|
+
model = models.CreateDataMaskStrategyRequest()
|
|
5718
|
+
model.from_json_string(json.dumps(args))
|
|
5719
|
+
start_time = time.time()
|
|
5720
|
+
while True:
|
|
5721
|
+
rsp = client.CreateDataMaskStrategy(model)
|
|
5722
|
+
result = rsp.to_json_string()
|
|
5723
|
+
try:
|
|
5724
|
+
json_obj = json.loads(result)
|
|
5725
|
+
except TypeError as e:
|
|
5726
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5727
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5728
|
+
break
|
|
5729
|
+
cur_time = time.time()
|
|
5730
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5731
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5732
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5733
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5734
|
+
else:
|
|
5735
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5736
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5737
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5738
|
+
|
|
5739
|
+
|
|
5168
5740
|
def doDescribeStoreLocation(args, parsed_globals):
|
|
5169
5741
|
g_param = parse_global_arg(parsed_globals)
|
|
5170
5742
|
|
|
@@ -5175,7 +5747,10 @@ def doDescribeStoreLocation(args, parsed_globals):
|
|
|
5175
5747
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5176
5748
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5177
5749
|
)
|
|
5178
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5750
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5751
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5752
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5179
5754
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5180
5755
|
else:
|
|
5181
5756
|
cred = credential.Credential(
|
|
@@ -5187,7 +5762,7 @@ def doDescribeStoreLocation(args, parsed_globals):
|
|
|
5187
5762
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5188
5763
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5189
5764
|
)
|
|
5190
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5765
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5191
5766
|
if g_param[OptionsDefine.Language]:
|
|
5192
5767
|
profile.language = g_param[OptionsDefine.Language]
|
|
5193
5768
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5227,7 +5802,10 @@ def doDescribeSparkAppJob(args, parsed_globals):
|
|
|
5227
5802
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5228
5803
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5229
5804
|
)
|
|
5230
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5805
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5806
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5807
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5231
5809
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5232
5810
|
else:
|
|
5233
5811
|
cred = credential.Credential(
|
|
@@ -5239,7 +5817,7 @@ def doDescribeSparkAppJob(args, parsed_globals):
|
|
|
5239
5817
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5240
5818
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5241
5819
|
)
|
|
5242
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5820
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5243
5821
|
if g_param[OptionsDefine.Language]:
|
|
5244
5822
|
profile.language = g_param[OptionsDefine.Language]
|
|
5245
5823
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5269,7 +5847,7 @@ def doDescribeSparkAppJob(args, parsed_globals):
|
|
|
5269
5847
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5270
5848
|
|
|
5271
5849
|
|
|
5272
|
-
def
|
|
5850
|
+
def doUpdateDataMaskStrategy(args, parsed_globals):
|
|
5273
5851
|
g_param = parse_global_arg(parsed_globals)
|
|
5274
5852
|
|
|
5275
5853
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -5279,7 +5857,10 @@ def doCreateDataEngine(args, parsed_globals):
|
|
|
5279
5857
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5280
5858
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5281
5859
|
)
|
|
5282
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5860
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5861
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5862
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5283
5864
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5284
5865
|
else:
|
|
5285
5866
|
cred = credential.Credential(
|
|
@@ -5291,18 +5872,18 @@ def doCreateDataEngine(args, parsed_globals):
|
|
|
5291
5872
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5292
5873
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5293
5874
|
)
|
|
5294
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5875
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5295
5876
|
if g_param[OptionsDefine.Language]:
|
|
5296
5877
|
profile.language = g_param[OptionsDefine.Language]
|
|
5297
5878
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5298
5879
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5299
5880
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
5300
5881
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5301
|
-
model = models.
|
|
5882
|
+
model = models.UpdateDataMaskStrategyRequest()
|
|
5302
5883
|
model.from_json_string(json.dumps(args))
|
|
5303
5884
|
start_time = time.time()
|
|
5304
5885
|
while True:
|
|
5305
|
-
rsp = client.
|
|
5886
|
+
rsp = client.UpdateDataMaskStrategy(model)
|
|
5306
5887
|
result = rsp.to_json_string()
|
|
5307
5888
|
try:
|
|
5308
5889
|
json_obj = json.loads(result)
|
|
@@ -5331,7 +5912,10 @@ def doDescribeDataEnginePythonSparkImages(args, parsed_globals):
|
|
|
5331
5912
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5332
5913
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5333
5914
|
)
|
|
5334
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5915
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5916
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5917
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5335
5919
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5336
5920
|
else:
|
|
5337
5921
|
cred = credential.Credential(
|
|
@@ -5343,7 +5927,7 @@ def doDescribeDataEnginePythonSparkImages(args, parsed_globals):
|
|
|
5343
5927
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5344
5928
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5345
5929
|
)
|
|
5346
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5930
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5347
5931
|
if g_param[OptionsDefine.Language]:
|
|
5348
5932
|
profile.language = g_param[OptionsDefine.Language]
|
|
5349
5933
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5383,7 +5967,10 @@ def doDescribeLakeFsInfo(args, parsed_globals):
|
|
|
5383
5967
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5384
5968
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5385
5969
|
)
|
|
5386
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5970
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5971
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5972
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5387
5974
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5388
5975
|
else:
|
|
5389
5976
|
cred = credential.Credential(
|
|
@@ -5395,7 +5982,7 @@ def doDescribeLakeFsInfo(args, parsed_globals):
|
|
|
5395
5982
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5396
5983
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5397
5984
|
)
|
|
5398
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5985
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5399
5986
|
if g_param[OptionsDefine.Language]:
|
|
5400
5987
|
profile.language = g_param[OptionsDefine.Language]
|
|
5401
5988
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5443,11 +6030,13 @@ ACTION_MAP = {
|
|
|
5443
6030
|
"DescribeUserRoles": doDescribeUserRoles,
|
|
5444
6031
|
"ModifyUserType": doModifyUserType,
|
|
5445
6032
|
"DescribeWorkGroupInfo": doDescribeWorkGroupInfo,
|
|
6033
|
+
"DescribeDataMaskStrategies": doDescribeDataMaskStrategies,
|
|
5446
6034
|
"DeleteWorkGroup": doDeleteWorkGroup,
|
|
5447
6035
|
"DescribeDataEngine": doDescribeDataEngine,
|
|
5448
6036
|
"CreateStoreLocation": doCreateStoreLocation,
|
|
5449
6037
|
"SwitchDataEngine": doSwitchDataEngine,
|
|
5450
6038
|
"DescribeSparkSessionBatchSqlLog": doDescribeSparkSessionBatchSqlLog,
|
|
6039
|
+
"DeleteDataMaskStrategy": doDeleteDataMaskStrategy,
|
|
5451
6040
|
"DescribeDLCCatalogAccess": doDescribeDLCCatalogAccess,
|
|
5452
6041
|
"DescribeUserType": doDescribeUserType,
|
|
5453
6042
|
"DescribeTasks": doDescribeTasks,
|
|
@@ -5460,6 +6049,7 @@ ACTION_MAP = {
|
|
|
5460
6049
|
"CheckGrantedPermission": doCheckGrantedPermission,
|
|
5461
6050
|
"RevokeDLCCatalogAccess": doRevokeDLCCatalogAccess,
|
|
5462
6051
|
"CreateUser": doCreateUser,
|
|
6052
|
+
"DescribeSparkAppTasks": doDescribeSparkAppTasks,
|
|
5463
6053
|
"DescribeDataEngineImageVersions": doDescribeDataEngineImageVersions,
|
|
5464
6054
|
"DescribeAdvancedStoreLocation": doDescribeAdvancedStoreLocation,
|
|
5465
6055
|
"DescribeSparkAppJobs": doDescribeSparkAppJobs,
|
|
@@ -5523,10 +6113,11 @@ ACTION_MAP = {
|
|
|
5523
6113
|
"DescribeJobs": doDescribeJobs,
|
|
5524
6114
|
"RegisterThirdPartyAccessUser": doRegisterThirdPartyAccessUser,
|
|
5525
6115
|
"DeleteUsersFromWorkGroup": doDeleteUsersFromWorkGroup,
|
|
5526
|
-
"
|
|
6116
|
+
"CreateDataEngine": doCreateDataEngine,
|
|
5527
6117
|
"UnbindWorkGroupsFromUser": doUnbindWorkGroupsFromUser,
|
|
5528
6118
|
"DescribeWorkGroups": doDescribeWorkGroups,
|
|
5529
6119
|
"RestartDataEngine": doRestartDataEngine,
|
|
6120
|
+
"AttachDataMaskPolicy": doAttachDataMaskPolicy,
|
|
5530
6121
|
"RenewDataEngine": doRenewDataEngine,
|
|
5531
6122
|
"DeleteThirdPartyAccessUser": doDeleteThirdPartyAccessUser,
|
|
5532
6123
|
"DescribeDMSDatabase": doDescribeDMSDatabase,
|
|
@@ -5535,9 +6126,10 @@ ACTION_MAP = {
|
|
|
5535
6126
|
"ModifyUser": doModifyUser,
|
|
5536
6127
|
"ModifyDataEngineDescription": doModifyDataEngineDescription,
|
|
5537
6128
|
"DropDMSTable": doDropDMSTable,
|
|
6129
|
+
"CreateDataMaskStrategy": doCreateDataMaskStrategy,
|
|
5538
6130
|
"DescribeStoreLocation": doDescribeStoreLocation,
|
|
5539
6131
|
"DescribeSparkAppJob": doDescribeSparkAppJob,
|
|
5540
|
-
"
|
|
6132
|
+
"UpdateDataMaskStrategy": doUpdateDataMaskStrategy,
|
|
5541
6133
|
"DescribeDataEnginePythonSparkImages": doDescribeDataEnginePythonSparkImages,
|
|
5542
6134
|
"DescribeLakeFsInfo": doDescribeLakeFsInfo,
|
|
5543
6135
|
|