tccli 3.0.1035.1__py2.py3-none-any.whl → 3.0.1037.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/examples/cdc/v20201214/DescribeDedicatedClusterHosts.md +2 -0
- tccli/examples/cdc/v20201214/DescribeDedicatedClusterOverview.md +59 -7
- tccli/examples/cdwch/v20200915/DescribeInstanceNodes.md +41 -0
- tccli/examples/cdwch/v20200915/DescribeSpec.md +27 -20
- tccli/examples/cwp/v20180228/CreateMalwareWhiteList.md +10 -4
- tccli/examples/cwp/v20180228/DescribeMachineFileTamperRules.md +9 -8
- tccli/examples/cwp/v20180228/ModifyLoginWhiteRecord.md +11 -10
- tccli/examples/hai/v20230812/DescribeApplications.md +6 -2
- tccli/examples/mrs/v20200910/ImageMaskAsync.md +25 -0
- tccli/examples/mrs/v20200910/ImageMaskAsyncGetResult.md +21 -0
- tccli/examples/tcss/v20201101/DescribeAssetSuperNodeList.md +41 -0
- tccli/examples/tcss/v20201101/DescribeClusterNodes.md +42 -0
- tccli/examples/tcss/v20201101/DescribeSuperNodePodList.md +41 -0
- tccli/examples/tcss/v20201101/DescribeUserPodList.md +56 -0
- tccli/examples/tms/v20201229/ModerateText.md +80 -0
- tccli/examples/vod/v20180717/PullEvents.md +2 -1
- tccli/services/aa/aa_client.py +2 -1
- tccli/services/aai/aai_client.py +5 -4
- tccli/services/acp/acp_client.py +9 -8
- tccli/services/advisor/advisor_client.py +3 -2
- tccli/services/af/af_client.py +4 -3
- tccli/services/afc/afc_client.py +4 -3
- tccli/services/aiart/aiart_client.py +3 -2
- tccli/services/aiart/v20221229/api.json +3 -3
- tccli/services/ame/ame_client.py +32 -31
- tccli/services/ams/ams_client.py +10 -9
- tccli/services/anicloud/anicloud_client.py +4 -3
- tccli/services/antiddos/antiddos_client.py +96 -95
- tccli/services/apcas/apcas_client.py +8 -7
- tccli/services/ape/ape_client.py +9 -8
- tccli/services/api/api_client.py +4 -3
- tccli/services/apigateway/apigateway_client.py +97 -96
- tccli/services/apm/apm_client.py +10 -9
- tccli/services/asr/asr_client.py +26 -25
- tccli/services/asw/asw_client.py +10 -9
- tccli/services/autoscaling/autoscaling_client.py +58 -57
- tccli/services/ba/ba_client.py +4 -3
- tccli/services/batch/batch_client.py +32 -31
- tccli/services/batch/v20170312/api.json +3 -3
- tccli/services/bda/bda_client.py +19 -18
- tccli/services/bi/bi_client.py +23 -22
- tccli/services/billing/billing_client.py +33 -32
- tccli/services/bizlive/bizlive_client.py +7 -6
- tccli/services/bm/bm_client.py +54 -53
- tccli/services/bma/bma_client.py +38 -37
- tccli/services/bmeip/bmeip_client.py +21 -20
- tccli/services/bmlb/bmlb_client.py +50 -49
- tccli/services/bmvpc/bmvpc_client.py +62 -61
- tccli/services/bpaas/bpaas_client.py +3 -2
- tccli/services/bri/bri_client.py +2 -1
- tccli/services/bsca/bsca_client.py +8 -7
- tccli/services/btoe/btoe_client.py +15 -14
- tccli/services/cam/cam_client.py +88 -87
- tccli/services/captcha/captcha_client.py +19 -18
- tccli/services/car/car_client.py +7 -6
- tccli/services/cat/cat_client.py +13 -12
- tccli/services/cbs/cbs_client.py +42 -41
- tccli/services/ccc/ccc_client.py +42 -41
- tccli/services/cdb/cdb_client.py +159 -158
- tccli/services/cdb/v20170320/api.json +1 -1
- tccli/services/cdc/cdc_client.py +21 -20
- tccli/services/cdc/v20201214/api.json +113 -27
- tccli/services/cdc/v20201214/examples.json +2 -2
- tccli/services/cdn/cdn_client.py +82 -81
- tccli/services/cdn/v20180606/api.json +10 -1
- tccli/services/cds/cds_client.py +7 -6
- tccli/services/cdwch/cdwch_client.py +109 -55
- tccli/services/cdwch/v20200915/api.json +253 -3
- tccli/services/cdwch/v20200915/examples.json +10 -2
- tccli/services/cdwdoris/cdwdoris_client.py +18 -17
- tccli/services/cdwdoris/v20211228/api.json +1 -1
- tccli/services/cdwpg/cdwpg_client.py +9 -8
- tccli/services/cfg/cfg_client.py +13 -12
- tccli/services/cfs/cfs_client.py +44 -43
- tccli/services/cfw/cfw_client.py +112 -111
- tccli/services/chdfs/chdfs_client.py +30 -29
- tccli/services/ciam/ciam_client.py +24 -23
- tccli/services/cii/cii_client.py +14 -13
- tccli/services/cim/cim_client.py +2 -1
- tccli/services/cis/cis_client.py +8 -7
- tccli/services/ckafka/ckafka_client.py +82 -81
- tccli/services/clb/clb_client.py +86 -85
- tccli/services/cloudaudit/cloudaudit_client.py +20 -19
- tccli/services/cloudhsm/cloudhsm_client.py +15 -14
- tccli/services/cloudstudio/cloudstudio_client.py +10 -9
- tccli/services/cls/cls_client.py +90 -89
- tccli/services/cme/cme_client.py +51 -50
- tccli/services/cmq/cmq_client.py +18 -17
- tccli/services/cms/cms_client.py +7 -6
- tccli/services/config/config_client.py +4 -3
- tccli/services/cpdp/cpdp_client.py +220 -219
- tccli/services/cr/cr_client.py +29 -28
- tccli/services/csip/csip_client.py +35 -34
- tccli/services/csxg/csxg_client.py +6 -5
- tccli/services/cvm/cvm_client.py +95 -94
- tccli/services/cvm/v20170312/api.json +6 -4
- tccli/services/cwp/cwp_client.py +519 -518
- tccli/services/cwp/v20180228/api.json +17 -16
- tccli/services/cwp/v20180228/examples.json +5 -5
- tccli/services/cws/cws_client.py +20 -19
- tccli/services/cynosdb/cynosdb_client.py +131 -130
- tccli/services/dasb/dasb_client.py +56 -55
- tccli/services/dataintegration/dataintegration_client.py +2 -1
- tccli/services/dayu/dayu_client.py +113 -112
- tccli/services/dbbrain/dbbrain_client.py +62 -61
- tccli/services/dbdc/dbdc_client.py +7 -6
- tccli/services/dc/dc_client.py +22 -21
- tccli/services/dcdb/dcdb_client.py +74 -73
- tccli/services/dlc/dlc_client.py +124 -123
- tccli/services/dnspod/dnspod_client.py +73 -72
- tccli/services/domain/domain_client.py +34 -33
- tccli/services/drm/drm_client.py +12 -11
- tccli/services/ds/ds_client.py +13 -12
- tccli/services/dsgc/dsgc_client.py +149 -148
- tccli/services/dtf/dtf_client.py +2 -1
- tccli/services/dts/dts_client.py +69 -68
- tccli/services/dts/v20211206/api.json +1 -0
- tccli/services/eb/eb_client.py +33 -32
- tccli/services/ecc/ecc_client.py +5 -4
- tccli/services/ecdn/ecdn_client.py +17 -16
- tccli/services/ecm/ecm_client.py +140 -139
- tccli/services/eiam/eiam_client.py +43 -42
- tccli/services/eis/eis_client.py +9 -8
- tccli/services/emr/emr_client.py +36 -35
- tccli/services/es/es_client.py +43 -42
- tccli/services/ess/ess_client.py +72 -71
- tccli/services/ess/v20201111/api.json +2 -2
- tccli/services/essbasic/essbasic_client.py +123 -122
- tccli/services/essbasic/v20210526/api.json +11 -11
- tccli/services/facefusion/facefusion_client.py +5 -4
- tccli/services/faceid/faceid_client.py +36 -35
- tccli/services/fmu/fmu_client.py +11 -10
- tccli/services/ft/ft_client.py +7 -6
- tccli/services/gaap/gaap_client.py +104 -103
- tccli/services/gme/gme_client.py +29 -28
- tccli/services/goosefs/goosefs_client.py +21 -20
- tccli/services/gpm/gpm_client.py +19 -18
- tccli/services/gs/gs_client.py +9 -8
- tccli/services/gse/gse_client.py +75 -74
- tccli/services/habo/habo_client.py +3 -2
- tccli/services/hai/hai_client.py +12 -11
- tccli/services/hai/v20230812/api.json +59 -1
- tccli/services/hai/v20230812/examples.json +1 -1
- tccli/services/hasim/hasim_client.py +23 -22
- tccli/services/hcm/hcm_client.py +2 -1
- tccli/services/hunyuan/hunyuan_client.py +4 -3
- tccli/services/iai/iai_client.py +36 -35
- tccli/services/ic/ic_client.py +10 -9
- tccli/services/icr/icr_client.py +2 -1
- tccli/services/ie/ie_client.py +11 -10
- tccli/services/iecp/iecp_client.py +103 -102
- tccli/services/iir/iir_client.py +2 -1
- tccli/services/ims/ims_client.py +3 -2
- tccli/services/ioa/ioa_client.py +2 -1
- tccli/services/iot/iot_client.py +46 -45
- tccli/services/iotcloud/iotcloud_client.py +86 -85
- tccli/services/iotexplorer/iotexplorer_client.py +93 -92
- tccli/services/iottid/iottid_client.py +10 -9
- tccli/services/iotvideo/iotvideo_client.py +158 -157
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +105 -104
- tccli/services/irp/irp_client.py +12 -11
- tccli/services/iss/iss_client.py +83 -82
- tccli/services/ivld/ivld_client.py +26 -25
- tccli/services/keewidb/keewidb_client.py +39 -38
- tccli/services/kms/kms_client.py +54 -53
- tccli/services/lcic/lcic_client.py +61 -60
- tccli/services/lighthouse/lighthouse_client.py +108 -107
- tccli/services/lighthouse/v20200324/api.json +1 -1
- tccli/services/live/live_client.py +154 -153
- tccli/services/lowcode/lowcode_client.py +2 -1
- tccli/services/lp/lp_client.py +2 -1
- tccli/services/mall/mall_client.py +2 -1
- tccli/services/mariadb/mariadb_client.py +73 -72
- tccli/services/market/market_client.py +3 -2
- tccli/services/memcached/memcached_client.py +2 -1
- tccli/services/mgobe/mgobe_client.py +8 -7
- tccli/services/mmps/mmps_client.py +16 -15
- tccli/services/mna/mna_client.py +24 -23
- tccli/services/mongodb/mongodb_client.py +43 -42
- tccli/services/monitor/monitor_client.py +151 -150
- tccli/services/mps/mps_client.py +101 -100
- tccli/services/mrs/mrs_client.py +115 -8
- tccli/services/mrs/v20200910/api.json +97 -0
- tccli/services/mrs/v20200910/examples.json +16 -0
- tccli/services/ms/ms_client.py +24 -23
- tccli/services/msp/msp_client.py +8 -7
- tccli/services/mvj/mvj_client.py +2 -1
- tccli/services/nlp/nlp_client.py +13 -12
- tccli/services/npp/npp_client.py +9 -8
- tccli/services/oceanus/oceanus_client.py +39 -38
- tccli/services/oceanus/v20190422/api.json +39 -4
- tccli/services/ocr/ocr_client.py +82 -81
- tccli/services/omics/omics_client.py +16 -15
- tccli/services/organization/organization_client.py +48 -47
- tccli/services/partners/partners_client.py +20 -19
- tccli/services/pds/pds_client.py +3 -2
- tccli/services/postgres/postgres_client.py +91 -90
- tccli/services/privatedns/privatedns_client.py +26 -25
- tccli/services/pts/pts_client.py +45 -44
- tccli/services/rce/rce_client.py +4 -3
- tccli/services/redis/redis_client.py +96 -95
- tccli/services/region/region_client.py +4 -3
- tccli/services/rkp/rkp_client.py +4 -3
- tccli/services/rp/rp_client.py +2 -1
- tccli/services/rum/rum_client.py +66 -65
- tccli/services/scf/scf_client.py +47 -46
- tccli/services/ses/ses_client.py +28 -27
- tccli/services/smh/smh_client.py +11 -10
- tccli/services/smop/smop_client.py +2 -1
- tccli/services/smpn/smpn_client.py +6 -5
- tccli/services/sms/sms_client.py +19 -18
- tccli/services/soe/soe_client.py +5 -4
- tccli/services/solar/solar_client.py +18 -17
- tccli/services/sqlserver/sqlserver_client.py +145 -144
- tccli/services/ssa/ssa_client.py +24 -23
- tccli/services/ssl/ssl_client.py +58 -57
- tccli/services/sslpod/sslpod_client.py +11 -10
- tccli/services/ssm/ssm_client.py +25 -24
- tccli/services/sts/sts_client.py +7 -6
- tccli/services/taf/taf_client.py +4 -3
- tccli/services/tag/tag_client.py +32 -31
- tccli/services/tan/tan_client.py +2 -1
- tccli/services/tat/tat_client.py +29 -28
- tccli/services/tav/tav_client.py +5 -4
- tccli/services/tbaas/tbaas_client.py +26 -25
- tccli/services/tbm/tbm_client.py +10 -9
- tccli/services/tbp/tbp_client.py +5 -4
- tccli/services/tcaplusdb/tcaplusdb_client.py +54 -53
- tccli/services/tcb/tcb_client.py +90 -89
- tccli/services/tcbr/tcbr_client.py +11 -10
- tccli/services/tcex/tcex_client.py +3 -2
- tccli/services/tchd/tchd_client.py +2 -1
- tccli/services/tci/tci_client.py +42 -41
- tccli/services/tcm/tcm_client.py +13 -12
- tccli/services/tcr/tcr_client.py +110 -109
- tccli/services/tcss/tcss_client.py +558 -345
- tccli/services/tcss/v20201101/api.json +1200 -0
- tccli/services/tcss/v20201101/examples.json +32 -0
- tccli/services/tdcpg/tdcpg_client.py +26 -25
- tccli/services/tdid/tdid_client.py +14 -13
- tccli/services/tdmq/tdmq_client.py +128 -127
- tccli/services/tds/tds_client.py +5 -4
- tccli/services/tem/tem_client.py +61 -60
- tccli/services/teo/teo_client.py +79 -78
- tccli/services/thpc/thpc_client.py +19 -18
- tccli/services/tia/tia_client.py +11 -10
- tccli/services/tic/tic_client.py +14 -13
- tccli/services/ticm/ticm_client.py +4 -3
- tccli/services/tics/tics_client.py +5 -4
- tccli/services/tiems/tiems_client.py +26 -25
- tccli/services/tiia/tiia_client.py +24 -23
- tccli/services/tione/tione_client.py +98 -97
- tccli/services/tiw/tiw_client.py +61 -60
- tccli/services/tke/tke_client.py +219 -218
- tccli/services/tkgdq/tkgdq_client.py +4 -3
- tccli/services/tms/tms_client.py +62 -8
- tccli/services/tms/v20201229/api.json +371 -17
- tccli/services/tms/v20201229/examples.json +8 -0
- tccli/services/tmt/tmt_client.py +8 -7
- tccli/services/tourism/tourism_client.py +2 -1
- tccli/services/trdp/trdp_client.py +2 -1
- tccli/services/trocket/trocket_client.py +23 -22
- tccli/services/trp/trp_client.py +54 -53
- tccli/services/trro/trro_client.py +24 -23
- tccli/services/trtc/trtc_client.py +44 -43
- tccli/services/tse/tse_client.py +66 -65
- tccli/services/tsf/tsf_client.py +220 -219
- tccli/services/tsw/tsw_client.py +5 -4
- tccli/services/tts/tts_client.py +4 -3
- tccli/services/ump/ump_client.py +18 -17
- tccli/services/vm/vm_client.py +7 -6
- tccli/services/vms/vms_client.py +3 -2
- tccli/services/vod/v20180717/api.json +10 -10
- tccli/services/vod/v20180717/examples.json +1 -1
- tccli/services/vod/vod_client.py +169 -168
- tccli/services/vpc/vpc_client.py +317 -316
- tccli/services/vrs/vrs_client.py +8 -7
- tccli/services/waf/waf_client.py +133 -132
- tccli/services/wav/wav_client.py +27 -26
- tccli/services/wedata/wedata_client.py +319 -318
- tccli/services/weilingwith/weilingwith_client.py +58 -57
- tccli/services/wss/wss_client.py +4 -3
- tccli/services/yinsuda/yinsuda_client.py +21 -20
- tccli/services/youmall/youmall_client.py +32 -31
- tccli/services/yunjing/yunjing_client.py +101 -100
- tccli/services/yunsou/yunsou_client.py +3 -2
- {tccli-3.0.1035.1.dist-info → tccli-3.0.1037.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1035.1.dist-info → tccli-3.0.1037.1.dist-info}/RECORD +292 -284
- {tccli-3.0.1035.1.dist-info → tccli-3.0.1037.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1035.1.dist-info → tccli-3.0.1037.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1035.1.dist-info → tccli-3.0.1037.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/vpc/vpc_client.py
CHANGED
@@ -25,7 +25,7 @@ def doDescribeVpcResourceDashboard(args, parsed_globals):
|
|
25
25
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
26
26
|
cred = credential.STSAssumeRoleCredential(
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
28
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
28
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
29
29
|
)
|
30
30
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
31
31
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -77,7 +77,7 @@ def doCreateDefaultSecurityGroup(args, parsed_globals):
|
|
77
77
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
78
78
|
cred = credential.STSAssumeRoleCredential(
|
79
79
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
80
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
80
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
81
81
|
)
|
82
82
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
83
83
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -129,7 +129,7 @@ def doDescribeCustomerGateways(args, parsed_globals):
|
|
129
129
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
130
130
|
cred = credential.STSAssumeRoleCredential(
|
131
131
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
132
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
132
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
133
133
|
)
|
134
134
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
135
135
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -181,7 +181,7 @@ def doReplaceSecurityGroupPolicy(args, parsed_globals):
|
|
181
181
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
182
182
|
cred = credential.STSAssumeRoleCredential(
|
183
183
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
184
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
184
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
185
185
|
)
|
186
186
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
187
187
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -233,7 +233,7 @@ def doAdjustPublicAddress(args, parsed_globals):
|
|
233
233
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
234
234
|
cred = credential.STSAssumeRoleCredential(
|
235
235
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
236
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
236
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
237
237
|
)
|
238
238
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
239
239
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -285,7 +285,7 @@ def doCreateFlowLog(args, parsed_globals):
|
|
285
285
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
286
286
|
cred = credential.STSAssumeRoleCredential(
|
287
287
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
288
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
288
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
289
289
|
)
|
290
290
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
291
291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -337,7 +337,7 @@ def doModifyNatGatewayAttribute(args, parsed_globals):
|
|
337
337
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
338
338
|
cred = credential.STSAssumeRoleCredential(
|
339
339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
340
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
340
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
341
341
|
)
|
342
342
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
343
343
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -389,7 +389,7 @@ def doDescribeTaskResult(args, parsed_globals):
|
|
389
389
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
390
390
|
cred = credential.STSAssumeRoleCredential(
|
391
391
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
392
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
392
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
393
393
|
)
|
394
394
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
395
395
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -441,7 +441,7 @@ def doCreateNetworkAcl(args, parsed_globals):
|
|
441
441
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
442
442
|
cred = credential.STSAssumeRoleCredential(
|
443
443
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
444
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
444
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
445
445
|
)
|
446
446
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
447
447
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -493,7 +493,7 @@ def doDescribeServiceTemplateGroups(args, parsed_globals):
|
|
493
493
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
494
494
|
cred = credential.STSAssumeRoleCredential(
|
495
495
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
496
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
496
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
497
497
|
)
|
498
498
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
499
499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -545,7 +545,7 @@ def doAddIp6Rules(args, parsed_globals):
|
|
545
545
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
546
546
|
cred = credential.STSAssumeRoleCredential(
|
547
547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
548
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
548
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
549
549
|
)
|
550
550
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
551
551
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -597,7 +597,7 @@ def doDescribeRouteTables(args, parsed_globals):
|
|
597
597
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
598
598
|
cred = credential.STSAssumeRoleCredential(
|
599
599
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
600
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
600
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
601
601
|
)
|
602
602
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
603
603
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -649,7 +649,7 @@ def doCreateBandwidthPackage(args, parsed_globals):
|
|
649
649
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
650
650
|
cred = credential.STSAssumeRoleCredential(
|
651
651
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
652
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
652
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
653
653
|
)
|
654
654
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
655
655
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -701,7 +701,7 @@ def doDeleteFlowLog(args, parsed_globals):
|
|
701
701
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
702
702
|
cred = credential.STSAssumeRoleCredential(
|
703
703
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
704
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
704
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
705
705
|
)
|
706
706
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
707
707
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -753,7 +753,7 @@ def doCreateRouteTable(args, parsed_globals):
|
|
753
753
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
754
754
|
cred = credential.STSAssumeRoleCredential(
|
755
755
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
756
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
756
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
757
757
|
)
|
758
758
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
759
759
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -805,7 +805,7 @@ def doAssignIpv6CidrBlock(args, parsed_globals):
|
|
805
805
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
806
806
|
cred = credential.STSAssumeRoleCredential(
|
807
807
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
808
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
808
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
809
809
|
)
|
810
810
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
811
811
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -857,7 +857,7 @@ def doDeleteNetworkAcl(args, parsed_globals):
|
|
857
857
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
858
858
|
cred = credential.STSAssumeRoleCredential(
|
859
859
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
860
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
860
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
861
861
|
)
|
862
862
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
863
863
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -909,7 +909,7 @@ def doDeleteVpcEndPointServiceWhiteList(args, parsed_globals):
|
|
909
909
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
910
910
|
cred = credential.STSAssumeRoleCredential(
|
911
911
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
912
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
912
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
913
913
|
)
|
914
914
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
915
915
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -961,7 +961,7 @@ def doDescribeNatGatewayDestinationIpPortTranslationNatRules(args, parsed_global
|
|
961
961
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
962
962
|
cred = credential.STSAssumeRoleCredential(
|
963
963
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
964
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
964
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
965
965
|
)
|
966
966
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
967
967
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1013,7 +1013,7 @@ def doModifyFlowLogAttribute(args, parsed_globals):
|
|
1013
1013
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1014
1014
|
cred = credential.STSAssumeRoleCredential(
|
1015
1015
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1016
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1016
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1017
1017
|
)
|
1018
1018
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1019
1019
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1065,7 +1065,7 @@ def doDisassociateNetworkInterfaceSecurityGroups(args, parsed_globals):
|
|
1065
1065
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1066
1066
|
cred = credential.STSAssumeRoleCredential(
|
1067
1067
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1068
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1068
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1069
1069
|
)
|
1070
1070
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1071
1071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1117,7 +1117,7 @@ def doModifyAddressInternetChargeType(args, parsed_globals):
|
|
1117
1117
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1118
1118
|
cred = credential.STSAssumeRoleCredential(
|
1119
1119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1120
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1120
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1121
1121
|
)
|
1122
1122
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1123
1123
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1169,7 +1169,7 @@ def doDescribeCcnAttachedInstances(args, parsed_globals):
|
|
1169
1169
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1170
1170
|
cred = credential.STSAssumeRoleCredential(
|
1171
1171
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1172
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1172
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1173
1173
|
)
|
1174
1174
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1175
1175
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1221,7 +1221,7 @@ def doResetRoutes(args, parsed_globals):
|
|
1221
1221
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1222
1222
|
cred = credential.STSAssumeRoleCredential(
|
1223
1223
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1224
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1224
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1225
1225
|
)
|
1226
1226
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1227
1227
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1273,7 +1273,7 @@ def doDeleteVpnGatewaySslServer(args, parsed_globals):
|
|
1273
1273
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1274
1274
|
cred = credential.STSAssumeRoleCredential(
|
1275
1275
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1276
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1276
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1277
1277
|
)
|
1278
1278
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1279
1279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1325,7 +1325,7 @@ def doDescribeNetworkInterfaceLimit(args, parsed_globals):
|
|
1325
1325
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1326
1326
|
cred = credential.STSAssumeRoleCredential(
|
1327
1327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1328
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1328
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1329
1329
|
)
|
1330
1330
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1331
1331
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1377,7 +1377,7 @@ def doEnableSnapshotPolicies(args, parsed_globals):
|
|
1377
1377
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1378
1378
|
cred = credential.STSAssumeRoleCredential(
|
1379
1379
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1380
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1380
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1381
1381
|
)
|
1382
1382
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1383
1383
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1429,7 +1429,7 @@ def doDeleteNetworkAclEntries(args, parsed_globals):
|
|
1429
1429
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1430
1430
|
cred = credential.STSAssumeRoleCredential(
|
1431
1431
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1432
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1432
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1433
1433
|
)
|
1434
1434
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1435
1435
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1481,7 +1481,7 @@ def doAcceptVpcPeeringConnection(args, parsed_globals):
|
|
1481
1481
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1482
1482
|
cred = credential.STSAssumeRoleCredential(
|
1483
1483
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1484
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1484
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1485
1485
|
)
|
1486
1486
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1487
1487
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1533,7 +1533,7 @@ def doModifyCcnRegionBandwidthLimitsType(args, parsed_globals):
|
|
1533
1533
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1534
1534
|
cred = credential.STSAssumeRoleCredential(
|
1535
1535
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1536
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1536
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1537
1537
|
)
|
1538
1538
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1539
1539
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1585,7 +1585,7 @@ def doDescribeGatewayFlowMonitorDetail(args, parsed_globals):
|
|
1585
1585
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1586
1586
|
cred = credential.STSAssumeRoleCredential(
|
1587
1587
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1588
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1588
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1589
1589
|
)
|
1590
1590
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1591
1591
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1637,7 +1637,7 @@ def doEnableGatewayFlowMonitor(args, parsed_globals):
|
|
1637
1637
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1638
1638
|
cred = credential.STSAssumeRoleCredential(
|
1639
1639
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1640
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1640
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1641
1641
|
)
|
1642
1642
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1643
1643
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1689,7 +1689,7 @@ def doUnassignIpv6Addresses(args, parsed_globals):
|
|
1689
1689
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1690
1690
|
cred = credential.STSAssumeRoleCredential(
|
1691
1691
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1692
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1692
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1693
1693
|
)
|
1694
1694
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1695
1695
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1741,7 +1741,7 @@ def doAssociateDirectConnectGatewayNatGateway(args, parsed_globals):
|
|
1741
1741
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1742
1742
|
cred = credential.STSAssumeRoleCredential(
|
1743
1743
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1744
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1744
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1745
1745
|
)
|
1746
1746
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1747
1747
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1793,7 +1793,7 @@ def doDeleteVpnConnection(args, parsed_globals):
|
|
1793
1793
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1794
1794
|
cred = credential.STSAssumeRoleCredential(
|
1795
1795
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1796
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1796
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1797
1797
|
)
|
1798
1798
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1799
1799
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1845,7 +1845,7 @@ def doDeleteSnapshotPolicies(args, parsed_globals):
|
|
1845
1845
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1846
1846
|
cred = credential.STSAssumeRoleCredential(
|
1847
1847
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1848
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1848
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1849
1849
|
)
|
1850
1850
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1851
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1897,7 +1897,7 @@ def doEnableVpcEndPointConnect(args, parsed_globals):
|
|
1897
1897
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1898
1898
|
cred = credential.STSAssumeRoleCredential(
|
1899
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1900
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1900
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1901
1901
|
)
|
1902
1902
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1903
1903
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -1949,7 +1949,7 @@ def doDeleteAddressTemplateGroup(args, parsed_globals):
|
|
1949
1949
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1950
1950
|
cred = credential.STSAssumeRoleCredential(
|
1951
1951
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1952
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1952
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1953
1953
|
)
|
1954
1954
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1955
1955
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2001,7 +2001,7 @@ def doDescribeCustomerGatewayVendors(args, parsed_globals):
|
|
2001
2001
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2002
2002
|
cred = credential.STSAssumeRoleCredential(
|
2003
2003
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2004
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2004
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2005
2005
|
)
|
2006
2006
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2007
2007
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2053,7 +2053,7 @@ def doDescribeAddresses(args, parsed_globals):
|
|
2053
2053
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2054
2054
|
cred = credential.STSAssumeRoleCredential(
|
2055
2055
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2056
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2056
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2057
2057
|
)
|
2058
2058
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2059
2059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2105,7 +2105,7 @@ def doDescribeVpcEndPointService(args, parsed_globals):
|
|
2105
2105
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2106
2106
|
cred = credential.STSAssumeRoleCredential(
|
2107
2107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2108
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2108
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2109
2109
|
)
|
2110
2110
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2111
2111
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2157,7 +2157,7 @@ def doDescribeVpcTaskResult(args, parsed_globals):
|
|
2157
2157
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2158
2158
|
cred = credential.STSAssumeRoleCredential(
|
2159
2159
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2160
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2160
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2161
2161
|
)
|
2162
2162
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2163
2163
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2209,7 +2209,7 @@ def doDeleteLocalGateway(args, parsed_globals):
|
|
2209
2209
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2210
2210
|
cred = credential.STSAssumeRoleCredential(
|
2211
2211
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2212
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2212
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2213
2213
|
)
|
2214
2214
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2215
2215
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2261,7 +2261,7 @@ def doCreateDirectConnectGateway(args, parsed_globals):
|
|
2261
2261
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2262
2262
|
cred = credential.STSAssumeRoleCredential(
|
2263
2263
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2264
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2264
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2265
2265
|
)
|
2266
2266
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2267
2267
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2313,7 +2313,7 @@ def doDescribeSecurityGroupPolicies(args, parsed_globals):
|
|
2313
2313
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2314
2314
|
cred = credential.STSAssumeRoleCredential(
|
2315
2315
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2316
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2316
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2317
2317
|
)
|
2318
2318
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2319
2319
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2365,7 +2365,7 @@ def doUnlockCcns(args, parsed_globals):
|
|
2365
2365
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2366
2366
|
cred = credential.STSAssumeRoleCredential(
|
2367
2367
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2368
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2368
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2369
2369
|
)
|
2370
2370
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2371
2371
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2417,7 +2417,7 @@ def doModifyNatGatewaySourceIpTranslationNatRule(args, parsed_globals):
|
|
2417
2417
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2418
2418
|
cred = credential.STSAssumeRoleCredential(
|
2419
2419
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2420
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2420
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2421
2421
|
)
|
2422
2422
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2423
2423
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2469,7 +2469,7 @@ def doAssociateNatGatewayAddress(args, parsed_globals):
|
|
2469
2469
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2470
2470
|
cred = credential.STSAssumeRoleCredential(
|
2471
2471
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2472
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2472
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2473
2473
|
)
|
2474
2474
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2475
2475
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2521,7 +2521,7 @@ def doModifyVpcEndPointAttribute(args, parsed_globals):
|
|
2521
2521
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2522
2522
|
cred = credential.STSAssumeRoleCredential(
|
2523
2523
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2524
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2524
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2525
2525
|
)
|
2526
2526
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2527
2527
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2573,7 +2573,7 @@ def doDescribeVpnGatewayRoutes(args, parsed_globals):
|
|
2573
2573
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2574
2574
|
cred = credential.STSAssumeRoleCredential(
|
2575
2575
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2576
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2576
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2577
2577
|
)
|
2578
2578
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2579
2579
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2625,7 +2625,7 @@ def doModifyVpnGatewayRoutes(args, parsed_globals):
|
|
2625
2625
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2626
2626
|
cred = credential.STSAssumeRoleCredential(
|
2627
2627
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2628
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2628
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2629
2629
|
)
|
2630
2630
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2631
2631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2677,7 +2677,7 @@ def doReplaceSecurityGroupPolicies(args, parsed_globals):
|
|
2677
2677
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2678
2678
|
cred = credential.STSAssumeRoleCredential(
|
2679
2679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2680
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2680
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2681
2681
|
)
|
2682
2682
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2683
2683
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2729,7 +2729,7 @@ def doDisassociateVpcEndPointSecurityGroups(args, parsed_globals):
|
|
2729
2729
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2730
2730
|
cred = credential.STSAssumeRoleCredential(
|
2731
2731
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2732
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2732
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2733
2733
|
)
|
2734
2734
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2735
2735
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2781,7 +2781,7 @@ def doWithdrawNotifyRoutes(args, parsed_globals):
|
|
2781
2781
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2782
2782
|
cred = credential.STSAssumeRoleCredential(
|
2783
2783
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2784
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2784
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2785
2785
|
)
|
2786
2786
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2787
2787
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2833,7 +2833,7 @@ def doRemoveBandwidthPackageResources(args, parsed_globals):
|
|
2833
2833
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2834
2834
|
cred = credential.STSAssumeRoleCredential(
|
2835
2835
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2836
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2836
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2837
2837
|
)
|
2838
2838
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2839
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2885,7 +2885,7 @@ def doCloneSecurityGroup(args, parsed_globals):
|
|
2885
2885
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2886
2886
|
cred = credential.STSAssumeRoleCredential(
|
2887
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2888
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2888
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2889
2889
|
)
|
2890
2890
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2891
2891
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2937,7 +2937,7 @@ def doAssignPrivateIpAddresses(args, parsed_globals):
|
|
2937
2937
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2938
2938
|
cred = credential.STSAssumeRoleCredential(
|
2939
2939
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2940
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2940
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2941
2941
|
)
|
2942
2942
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2943
2943
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -2989,7 +2989,7 @@ def doModifyVpnGatewaySslServer(args, parsed_globals):
|
|
2989
2989
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2990
2990
|
cred = credential.STSAssumeRoleCredential(
|
2991
2991
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2992
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2992
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2993
2993
|
)
|
2994
2994
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2995
2995
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3041,7 +3041,7 @@ def doDescribeCrossBorderFlowMonitor(args, parsed_globals):
|
|
3041
3041
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3042
3042
|
cred = credential.STSAssumeRoleCredential(
|
3043
3043
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3044
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3044
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3045
3045
|
)
|
3046
3046
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3047
3047
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3093,7 +3093,7 @@ def doEnableRoutes(args, parsed_globals):
|
|
3093
3093
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3094
3094
|
cred = credential.STSAssumeRoleCredential(
|
3095
3095
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3096
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3096
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3097
3097
|
)
|
3098
3098
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3099
3099
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3145,7 +3145,7 @@ def doCreateAndAttachNetworkInterface(args, parsed_globals):
|
|
3145
3145
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3146
3146
|
cred = credential.STSAssumeRoleCredential(
|
3147
3147
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3148
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3148
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3149
3149
|
)
|
3150
3150
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3151
3151
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3197,7 +3197,7 @@ def doModifyVpcEndPointServiceWhiteList(args, parsed_globals):
|
|
3197
3197
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3198
3198
|
cred = credential.STSAssumeRoleCredential(
|
3199
3199
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3200
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3200
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3201
3201
|
)
|
3202
3202
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3203
3203
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3249,7 +3249,7 @@ def doModifySnapshotPolicies(args, parsed_globals):
|
|
3249
3249
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3250
3250
|
cred = credential.STSAssumeRoleCredential(
|
3251
3251
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3252
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3252
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3253
3253
|
)
|
3254
3254
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3255
3255
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3301,7 +3301,7 @@ def doCreateSubnets(args, parsed_globals):
|
|
3301
3301
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3302
3302
|
cred = credential.STSAssumeRoleCredential(
|
3303
3303
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3304
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3304
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3305
3305
|
)
|
3306
3306
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3307
3307
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3353,7 +3353,7 @@ def doAssociateNetworkAclSubnets(args, parsed_globals):
|
|
3353
3353
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3354
3354
|
cred = credential.STSAssumeRoleCredential(
|
3355
3355
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3356
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3356
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3357
3357
|
)
|
3358
3358
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3359
3359
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3405,7 +3405,7 @@ def doCreateVpcPeeringConnection(args, parsed_globals):
|
|
3405
3405
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3406
3406
|
cred = credential.STSAssumeRoleCredential(
|
3407
3407
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3408
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3408
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3409
3409
|
)
|
3410
3410
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3411
3411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3457,7 +3457,7 @@ def doDescribeSpecificTrafficPackageUsedDetails(args, parsed_globals):
|
|
3457
3457
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3458
3458
|
cred = credential.STSAssumeRoleCredential(
|
3459
3459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3460
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3460
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3461
3461
|
)
|
3462
3462
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3463
3463
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3509,7 +3509,7 @@ def doGenerateVpnConnectionDefaultHealthCheckIp(args, parsed_globals):
|
|
3509
3509
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3510
3510
|
cred = credential.STSAssumeRoleCredential(
|
3511
3511
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3512
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3512
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3513
3513
|
)
|
3514
3514
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3515
3515
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3561,7 +3561,7 @@ def doDeleteTrafficPackages(args, parsed_globals):
|
|
3561
3561
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3562
3562
|
cred = credential.STSAssumeRoleCredential(
|
3563
3563
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3564
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3564
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3565
3565
|
)
|
3566
3566
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3567
3567
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3613,7 +3613,7 @@ def doDescribeTemplateLimits(args, parsed_globals):
|
|
3613
3613
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3614
3614
|
cred = credential.STSAssumeRoleCredential(
|
3615
3615
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3616
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3616
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3617
3617
|
)
|
3618
3618
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3619
3619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3665,7 +3665,7 @@ def doCheckNetDetectState(args, parsed_globals):
|
|
3665
3665
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3666
3666
|
cred = credential.STSAssumeRoleCredential(
|
3667
3667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3668
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3668
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3669
3669
|
)
|
3670
3670
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3671
3671
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3717,7 +3717,7 @@ def doDeleteVpnGatewaySslClient(args, parsed_globals):
|
|
3717
3717
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3718
3718
|
cred = credential.STSAssumeRoleCredential(
|
3719
3719
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3720
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3720
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3721
3721
|
)
|
3722
3722
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3723
3723
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3769,7 +3769,7 @@ def doInquiryPriceResetVpnGatewayInternetMaxBandwidth(args, parsed_globals):
|
|
3769
3769
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3770
3770
|
cred = credential.STSAssumeRoleCredential(
|
3771
3771
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3772
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3772
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3773
3773
|
)
|
3774
3774
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3775
3775
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3821,7 +3821,7 @@ def doDeleteDirectConnectGatewayCcnRoutes(args, parsed_globals):
|
|
3821
3821
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3822
3822
|
cred = credential.STSAssumeRoleCredential(
|
3823
3823
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3824
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3824
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3825
3825
|
)
|
3826
3826
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3827
3827
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3873,7 +3873,7 @@ def doDescribeNetworkAccountType(args, parsed_globals):
|
|
3873
3873
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3874
3874
|
cred = credential.STSAssumeRoleCredential(
|
3875
3875
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3876
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3876
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3877
3877
|
)
|
3878
3878
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3879
3879
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3925,7 +3925,7 @@ def doDeleteSecurityGroup(args, parsed_globals):
|
|
3925
3925
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3926
3926
|
cred = credential.STSAssumeRoleCredential(
|
3927
3927
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3928
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3928
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3929
3929
|
)
|
3930
3930
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3931
3931
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -3977,7 +3977,7 @@ def doModifyAddressesBandwidth(args, parsed_globals):
|
|
3977
3977
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3978
3978
|
cred = credential.STSAssumeRoleCredential(
|
3979
3979
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3980
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
3980
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3981
3981
|
)
|
3982
3982
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3983
3983
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4029,7 +4029,7 @@ def doCreateNatGatewayDestinationIpPortTranslationNatRule(args, parsed_globals):
|
|
4029
4029
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4030
4030
|
cred = credential.STSAssumeRoleCredential(
|
4031
4031
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4032
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4032
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4033
4033
|
)
|
4034
4034
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4035
4035
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4081,7 +4081,7 @@ def doCreateSubnet(args, parsed_globals):
|
|
4081
4081
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4082
4082
|
cred = credential.STSAssumeRoleCredential(
|
4083
4083
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4084
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4084
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4085
4085
|
)
|
4086
4086
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4087
4087
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4133,7 +4133,7 @@ def doCreateVpnGatewaySslClient(args, parsed_globals):
|
|
4133
4133
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4134
4134
|
cred = credential.STSAssumeRoleCredential(
|
4135
4135
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4136
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4136
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4137
4137
|
)
|
4138
4138
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4139
4139
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4185,7 +4185,7 @@ def doDescribeAssistantCidr(args, parsed_globals):
|
|
4185
4185
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4186
4186
|
cred = credential.STSAssumeRoleCredential(
|
4187
4187
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4188
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4188
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4189
4189
|
)
|
4190
4190
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4191
4191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4237,7 +4237,7 @@ def doAllocateIp6AddressesBandwidth(args, parsed_globals):
|
|
4237
4237
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4238
4238
|
cred = credential.STSAssumeRoleCredential(
|
4239
4239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4240
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4240
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4241
4241
|
)
|
4242
4242
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4243
4243
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4289,7 +4289,7 @@ def doDeleteDhcpIp(args, parsed_globals):
|
|
4289
4289
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4290
4290
|
cred = credential.STSAssumeRoleCredential(
|
4291
4291
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4292
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4292
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4293
4293
|
)
|
4294
4294
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4295
4295
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4341,7 +4341,7 @@ def doLockCcnBandwidths(args, parsed_globals):
|
|
4341
4341
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4342
4342
|
cred = credential.STSAssumeRoleCredential(
|
4343
4343
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4344
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4344
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4345
4345
|
)
|
4346
4346
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4347
4347
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4393,7 +4393,7 @@ def doModifyAddressTemplateAttribute(args, parsed_globals):
|
|
4393
4393
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4394
4394
|
cred = credential.STSAssumeRoleCredential(
|
4395
4395
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4396
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4396
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4397
4397
|
)
|
4398
4398
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4399
4399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4445,7 +4445,7 @@ def doAcceptAttachCcnInstances(args, parsed_globals):
|
|
4445
4445
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4446
4446
|
cred = credential.STSAssumeRoleCredential(
|
4447
4447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4448
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4448
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4449
4449
|
)
|
4450
4450
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4451
4451
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4497,7 +4497,7 @@ def doDeleteTemplateMember(args, parsed_globals):
|
|
4497
4497
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4498
4498
|
cred = credential.STSAssumeRoleCredential(
|
4499
4499
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4500
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4500
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4501
4501
|
)
|
4502
4502
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4503
4503
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4549,7 +4549,7 @@ def doDeleteServiceTemplateGroup(args, parsed_globals):
|
|
4549
4549
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4550
4550
|
cred = credential.STSAssumeRoleCredential(
|
4551
4551
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4552
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4552
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4553
4553
|
)
|
4554
4554
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4555
4555
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4601,7 +4601,7 @@ def doDescribeGatewayFlowQos(args, parsed_globals):
|
|
4601
4601
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4602
4602
|
cred = credential.STSAssumeRoleCredential(
|
4603
4603
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4604
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4604
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4605
4605
|
)
|
4606
4606
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4607
4607
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4653,7 +4653,7 @@ def doDescribeLocalGateway(args, parsed_globals):
|
|
4653
4653
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4654
4654
|
cred = credential.STSAssumeRoleCredential(
|
4655
4655
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4656
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4656
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4657
4657
|
)
|
4658
4658
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4659
4659
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4705,7 +4705,7 @@ def doDisableVpnGatewaySslClientCert(args, parsed_globals):
|
|
4705
4705
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4706
4706
|
cred = credential.STSAssumeRoleCredential(
|
4707
4707
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4708
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4708
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4709
4709
|
)
|
4710
4710
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4711
4711
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4757,7 +4757,7 @@ def doDescribeIp6Translators(args, parsed_globals):
|
|
4757
4757
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4758
4758
|
cred = credential.STSAssumeRoleCredential(
|
4759
4759
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4760
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4760
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4761
4761
|
)
|
4762
4762
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4763
4763
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4809,7 +4809,7 @@ def doCreateNetworkInterface(args, parsed_globals):
|
|
4809
4809
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4810
4810
|
cred = credential.STSAssumeRoleCredential(
|
4811
4811
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4812
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4812
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4813
4813
|
)
|
4814
4814
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4815
4815
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4861,7 +4861,7 @@ def doDescribeDirectConnectGateways(args, parsed_globals):
|
|
4861
4861
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4862
4862
|
cred = credential.STSAssumeRoleCredential(
|
4863
4863
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4864
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4864
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4865
4865
|
)
|
4866
4866
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4867
4867
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4913,7 +4913,7 @@ def doModifyServiceTemplateGroupAttribute(args, parsed_globals):
|
|
4913
4913
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4914
4914
|
cred = credential.STSAssumeRoleCredential(
|
4915
4915
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4916
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4916
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4917
4917
|
)
|
4918
4918
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4919
4919
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -4965,7 +4965,7 @@ def doCreateVpc(args, parsed_globals):
|
|
4965
4965
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4966
4966
|
cred = credential.STSAssumeRoleCredential(
|
4967
4967
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4968
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4968
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4969
4969
|
)
|
4970
4970
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4971
4971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5017,7 +5017,7 @@ def doModifyIp6Rule(args, parsed_globals):
|
|
5017
5017
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5018
5018
|
cred = credential.STSAssumeRoleCredential(
|
5019
5019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5020
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5020
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5021
5021
|
)
|
5022
5022
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5023
5023
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5069,7 +5069,7 @@ def doAddBandwidthPackageResources(args, parsed_globals):
|
|
5069
5069
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5070
5070
|
cred = credential.STSAssumeRoleCredential(
|
5071
5071
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5072
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5072
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5073
5073
|
)
|
5074
5074
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5075
5075
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5121,7 +5121,7 @@ def doAssignIpv6SubnetCidrBlock(args, parsed_globals):
|
|
5121
5121
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5122
5122
|
cred = credential.STSAssumeRoleCredential(
|
5123
5123
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5124
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5124
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5125
5125
|
)
|
5126
5126
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5127
5127
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5173,7 +5173,7 @@ def doDescribeVpnGatewayCcnRoutes(args, parsed_globals):
|
|
5173
5173
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5174
5174
|
cred = credential.STSAssumeRoleCredential(
|
5175
5175
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5176
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5176
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5177
5177
|
)
|
5178
5178
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5179
5179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5225,7 +5225,7 @@ def doAllocateAddresses(args, parsed_globals):
|
|
5225
5225
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5226
5226
|
cred = credential.STSAssumeRoleCredential(
|
5227
5227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5228
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5228
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5229
5229
|
)
|
5230
5230
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5231
5231
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5277,7 +5277,7 @@ def doDescribeSnapshotPolicies(args, parsed_globals):
|
|
5277
5277
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5278
5278
|
cred = credential.STSAssumeRoleCredential(
|
5279
5279
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5280
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5280
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5281
5281
|
)
|
5282
5282
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5283
5283
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5329,7 +5329,7 @@ def doCheckAssistantCidr(args, parsed_globals):
|
|
5329
5329
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5330
5330
|
cred = credential.STSAssumeRoleCredential(
|
5331
5331
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5332
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5332
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5333
5333
|
)
|
5334
5334
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5335
5335
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5381,7 +5381,7 @@ def doDeleteNetworkAclQuintupleEntries(args, parsed_globals):
|
|
5381
5381
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5382
5382
|
cred = credential.STSAssumeRoleCredential(
|
5383
5383
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5384
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5384
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5385
5385
|
)
|
5386
5386
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5387
5387
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5433,7 +5433,7 @@ def doDescribeVpcIpv6Addresses(args, parsed_globals):
|
|
5433
5433
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5434
5434
|
cred = credential.STSAssumeRoleCredential(
|
5435
5435
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5436
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5436
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5437
5437
|
)
|
5438
5438
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5439
5439
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5485,7 +5485,7 @@ def doDescribeIp6Addresses(args, parsed_globals):
|
|
5485
5485
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5486
5486
|
cred = credential.STSAssumeRoleCredential(
|
5487
5487
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5488
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5488
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5489
5489
|
)
|
5490
5490
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5491
5491
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5537,7 +5537,7 @@ def doUnlockCcnBandwidths(args, parsed_globals):
|
|
5537
5537
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5538
5538
|
cred = credential.STSAssumeRoleCredential(
|
5539
5539
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5540
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5540
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5541
5541
|
)
|
5542
5542
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5543
5543
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5589,7 +5589,7 @@ def doModifyVpcAttribute(args, parsed_globals):
|
|
5589
5589
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5590
5590
|
cred = credential.STSAssumeRoleCredential(
|
5591
5591
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5592
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5592
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5593
5593
|
)
|
5594
5594
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5595
5595
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5641,7 +5641,7 @@ def doDisableSnapshotPolicies(args, parsed_globals):
|
|
5641
5641
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5642
5642
|
cred = credential.STSAssumeRoleCredential(
|
5643
5643
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5644
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5644
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5645
5645
|
)
|
5646
5646
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5647
5647
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5693,7 +5693,7 @@ def doDescribeVpcs(args, parsed_globals):
|
|
5693
5693
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5694
5694
|
cred = credential.STSAssumeRoleCredential(
|
5695
5695
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5696
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5696
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5697
5697
|
)
|
5698
5698
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5699
5699
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5745,7 +5745,7 @@ def doAttachCcnInstances(args, parsed_globals):
|
|
5745
5745
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5746
5746
|
cred = credential.STSAssumeRoleCredential(
|
5747
5747
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5748
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5748
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5749
5749
|
)
|
5750
5750
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5751
5751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5797,7 +5797,7 @@ def doAssociateAddress(args, parsed_globals):
|
|
5797
5797
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5798
5798
|
cred = credential.STSAssumeRoleCredential(
|
5799
5799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5800
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5800
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5801
5801
|
)
|
5802
5802
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5803
5803
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5849,7 +5849,7 @@ def doDeleteCustomerGateway(args, parsed_globals):
|
|
5849
5849
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5850
5850
|
cred = credential.STSAssumeRoleCredential(
|
5851
5851
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5852
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5852
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5853
5853
|
)
|
5854
5854
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5855
5855
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5901,7 +5901,7 @@ def doDeleteSubnet(args, parsed_globals):
|
|
5901
5901
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5902
5902
|
cred = credential.STSAssumeRoleCredential(
|
5903
5903
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5904
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5904
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5905
5905
|
)
|
5906
5906
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5907
5907
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -5953,7 +5953,7 @@ def doAttachClassicLinkVpc(args, parsed_globals):
|
|
5953
5953
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5954
5954
|
cred = credential.STSAssumeRoleCredential(
|
5955
5955
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5956
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5956
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5957
5957
|
)
|
5958
5958
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5959
5959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6005,7 +6005,7 @@ def doDisassociateNatGatewayAddress(args, parsed_globals):
|
|
6005
6005
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6006
6006
|
cred = credential.STSAssumeRoleCredential(
|
6007
6007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6008
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6008
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6009
6009
|
)
|
6010
6010
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6011
6011
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6057,7 +6057,7 @@ def doModifyTemplateMember(args, parsed_globals):
|
|
6057
6057
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6058
6058
|
cred = credential.STSAssumeRoleCredential(
|
6059
6059
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6060
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6060
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6061
6061
|
)
|
6062
6062
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6063
6063
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6109,7 +6109,7 @@ def doDeleteVpcPeeringConnection(args, parsed_globals):
|
|
6109
6109
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6110
6110
|
cred = credential.STSAssumeRoleCredential(
|
6111
6111
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6112
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6112
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6113
6113
|
)
|
6114
6114
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6115
6115
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6161,7 +6161,7 @@ def doEnableFlowLogs(args, parsed_globals):
|
|
6161
6161
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6162
6162
|
cred = credential.STSAssumeRoleCredential(
|
6163
6163
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6164
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6164
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6165
6165
|
)
|
6166
6166
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6167
6167
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6213,7 +6213,7 @@ def doDescribeFlowLogs(args, parsed_globals):
|
|
6213
6213
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6214
6214
|
cred = credential.STSAssumeRoleCredential(
|
6215
6215
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6216
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6216
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6217
6217
|
)
|
6218
6218
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6219
6219
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6265,7 +6265,7 @@ def doDeleteDirectConnectGateway(args, parsed_globals):
|
|
6265
6265
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6266
6266
|
cred = credential.STSAssumeRoleCredential(
|
6267
6267
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6268
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6268
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6269
6269
|
)
|
6270
6270
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6271
6271
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6317,7 +6317,7 @@ def doCreateVpnGatewayRoutes(args, parsed_globals):
|
|
6317
6317
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6318
6318
|
cred = credential.STSAssumeRoleCredential(
|
6319
6319
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6320
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6320
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6321
6321
|
)
|
6322
6322
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6323
6323
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6369,7 +6369,7 @@ def doDescribeDirectConnectGatewayCcnRoutes(args, parsed_globals):
|
|
6369
6369
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6370
6370
|
cred = credential.STSAssumeRoleCredential(
|
6371
6371
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6372
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6372
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6373
6373
|
)
|
6374
6374
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6375
6375
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6421,7 +6421,7 @@ def doDescribeNetDetects(args, parsed_globals):
|
|
6421
6421
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6422
6422
|
cred = credential.STSAssumeRoleCredential(
|
6423
6423
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6424
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6424
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6425
6425
|
)
|
6426
6426
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6427
6427
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6473,7 +6473,7 @@ def doDeleteBandwidthPackage(args, parsed_globals):
|
|
6473
6473
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6474
6474
|
cred = credential.STSAssumeRoleCredential(
|
6475
6475
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6476
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6476
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6477
6477
|
)
|
6478
6478
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6479
6479
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6525,7 +6525,7 @@ def doCreateNetworkAclEntries(args, parsed_globals):
|
|
6525
6525
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6526
6526
|
cred = credential.STSAssumeRoleCredential(
|
6527
6527
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6528
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6528
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6529
6529
|
)
|
6530
6530
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6531
6531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6577,7 +6577,7 @@ def doDescribeNetDetectStates(args, parsed_globals):
|
|
6577
6577
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6578
6578
|
cred = credential.STSAssumeRoleCredential(
|
6579
6579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6580
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6580
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6581
6581
|
)
|
6582
6582
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6583
6583
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6629,7 +6629,7 @@ def doDescribeCcns(args, parsed_globals):
|
|
6629
6629
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6630
6630
|
cred = credential.STSAssumeRoleCredential(
|
6631
6631
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6632
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6632
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6633
6633
|
)
|
6634
6634
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6635
6635
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6681,7 +6681,7 @@ def doDeleteIp6Translators(args, parsed_globals):
|
|
6681
6681
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6682
6682
|
cred = credential.STSAssumeRoleCredential(
|
6683
6683
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6684
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6684
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6685
6685
|
)
|
6686
6686
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6687
6687
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6733,7 +6733,7 @@ def doDeleteCcn(args, parsed_globals):
|
|
6733
6733
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6734
6734
|
cred = credential.STSAssumeRoleCredential(
|
6735
6735
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6736
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6736
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6737
6737
|
)
|
6738
6738
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6739
6739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6785,7 +6785,7 @@ def doModifyNetworkAclEntries(args, parsed_globals):
|
|
6785
6785
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6786
6786
|
cred = credential.STSAssumeRoleCredential(
|
6787
6787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6788
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6788
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6789
6789
|
)
|
6790
6790
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6791
6791
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6837,7 +6837,7 @@ def doHaVipDisassociateAddressIp(args, parsed_globals):
|
|
6837
6837
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6838
6838
|
cred = credential.STSAssumeRoleCredential(
|
6839
6839
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6840
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6840
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6841
6841
|
)
|
6842
6842
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6843
6843
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6889,7 +6889,7 @@ def doDescribeHaVips(args, parsed_globals):
|
|
6889
6889
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6890
6890
|
cred = credential.STSAssumeRoleCredential(
|
6891
6891
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6892
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6892
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6893
6893
|
)
|
6894
6894
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6895
6895
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6941,7 +6941,7 @@ def doModifyVpnGatewayCcnRoutes(args, parsed_globals):
|
|
6941
6941
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6942
6942
|
cred = credential.STSAssumeRoleCredential(
|
6943
6943
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6944
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6944
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6945
6945
|
)
|
6946
6946
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6947
6947
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -6993,7 +6993,7 @@ def doDetachNetworkInterface(args, parsed_globals):
|
|
6993
6993
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6994
6994
|
cred = credential.STSAssumeRoleCredential(
|
6995
6995
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6996
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6996
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6997
6997
|
)
|
6998
6998
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6999
6999
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7045,7 +7045,7 @@ def doRejectAttachCcnInstances(args, parsed_globals):
|
|
7045
7045
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7046
7046
|
cred = credential.STSAssumeRoleCredential(
|
7047
7047
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7048
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7048
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7049
7049
|
)
|
7050
7050
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7051
7051
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7097,7 +7097,7 @@ def doCreateVpnConnection(args, parsed_globals):
|
|
7097
7097
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7098
7098
|
cred = credential.STSAssumeRoleCredential(
|
7099
7099
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7100
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7100
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7101
7101
|
)
|
7102
7102
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7103
7103
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7149,7 +7149,7 @@ def doModifyNetworkAclQuintupleEntries(args, parsed_globals):
|
|
7149
7149
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7150
7150
|
cred = credential.STSAssumeRoleCredential(
|
7151
7151
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7152
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7152
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7153
7153
|
)
|
7154
7154
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7155
7155
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7201,7 +7201,7 @@ def doDeleteAssistantCidr(args, parsed_globals):
|
|
7201
7201
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7202
7202
|
cred = credential.STSAssumeRoleCredential(
|
7203
7203
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7204
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7204
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7205
7205
|
)
|
7206
7206
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7207
7207
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7253,7 +7253,7 @@ def doDeleteVpnGatewayRoutes(args, parsed_globals):
|
|
7253
7253
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7254
7254
|
cred = credential.STSAssumeRoleCredential(
|
7255
7255
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7256
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7256
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7257
7257
|
)
|
7258
7258
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7259
7259
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7305,7 +7305,7 @@ def doModifyDhcpIpAttribute(args, parsed_globals):
|
|
7305
7305
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7306
7306
|
cred = credential.STSAssumeRoleCredential(
|
7307
7307
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7308
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7308
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7309
7309
|
)
|
7310
7310
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7311
7311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7357,7 +7357,7 @@ def doDescribeCrossBorderCcnRegionBandwidthLimits(args, parsed_globals):
|
|
7357
7357
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7358
7358
|
cred = credential.STSAssumeRoleCredential(
|
7359
7359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7360
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7360
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7361
7361
|
)
|
7362
7362
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7363
7363
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7409,7 +7409,7 @@ def doDescribeBandwidthPackageResources(args, parsed_globals):
|
|
7409
7409
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7410
7410
|
cred = credential.STSAssumeRoleCredential(
|
7411
7411
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7412
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7412
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7413
7413
|
)
|
7414
7414
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7415
7415
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7461,7 +7461,7 @@ def doDescribeNatGateways(args, parsed_globals):
|
|
7461
7461
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7462
7462
|
cred = credential.STSAssumeRoleCredential(
|
7463
7463
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7464
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7464
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7465
7465
|
)
|
7466
7466
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7467
7467
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7513,7 +7513,7 @@ def doDeleteNatGatewaySourceIpTranslationNatRule(args, parsed_globals):
|
|
7513
7513
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7514
7514
|
cred = credential.STSAssumeRoleCredential(
|
7515
7515
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7516
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7516
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7517
7517
|
)
|
7518
7518
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7519
7519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7565,7 +7565,7 @@ def doDeleteNetworkInterface(args, parsed_globals):
|
|
7565
7565
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7566
7566
|
cred = credential.STSAssumeRoleCredential(
|
7567
7567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7568
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7568
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7569
7569
|
)
|
7570
7570
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7571
7571
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7617,7 +7617,7 @@ def doModifyLocalGateway(args, parsed_globals):
|
|
7617
7617
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7618
7618
|
cred = credential.STSAssumeRoleCredential(
|
7619
7619
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7620
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7620
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7621
7621
|
)
|
7622
7622
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7623
7623
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7669,7 +7669,7 @@ def doDescribeDhcpIps(args, parsed_globals):
|
|
7669
7669
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7670
7670
|
cred = credential.STSAssumeRoleCredential(
|
7671
7671
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7672
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7672
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7673
7673
|
)
|
7674
7674
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7675
7675
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7721,7 +7721,7 @@ def doDescribeVpnConnections(args, parsed_globals):
|
|
7721
7721
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7722
7722
|
cred = credential.STSAssumeRoleCredential(
|
7723
7723
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7724
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7724
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7725
7725
|
)
|
7726
7726
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7727
7727
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7773,7 +7773,7 @@ def doDescribeSecurityGroupReferences(args, parsed_globals):
|
|
7773
7773
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7774
7774
|
cred = credential.STSAssumeRoleCredential(
|
7775
7775
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7776
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7776
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7777
7777
|
)
|
7778
7778
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7779
7779
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7825,7 +7825,7 @@ def doDescribeFlowLog(args, parsed_globals):
|
|
7825
7825
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7826
7826
|
cred = credential.STSAssumeRoleCredential(
|
7827
7827
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7828
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7828
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7829
7829
|
)
|
7830
7830
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7831
7831
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7877,7 +7877,7 @@ def doModifyGatewayFlowQos(args, parsed_globals):
|
|
7877
7877
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7878
7878
|
cred = credential.STSAssumeRoleCredential(
|
7879
7879
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7880
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7880
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7881
7881
|
)
|
7882
7882
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7883
7883
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7929,7 +7929,7 @@ def doDeleteNatGateway(args, parsed_globals):
|
|
7929
7929
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7930
7930
|
cred = credential.STSAssumeRoleCredential(
|
7931
7931
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7932
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7932
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7933
7933
|
)
|
7934
7934
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7935
7935
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -7981,7 +7981,7 @@ def doDescribeRouteConflicts(args, parsed_globals):
|
|
7981
7981
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7982
7982
|
cred = credential.STSAssumeRoleCredential(
|
7983
7983
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7984
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7984
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7985
7985
|
)
|
7986
7986
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7987
7987
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8033,7 +8033,7 @@ def doDescribeAccountAttributes(args, parsed_globals):
|
|
8033
8033
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8034
8034
|
cred = credential.STSAssumeRoleCredential(
|
8035
8035
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8036
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8036
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8037
8037
|
)
|
8038
8038
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8039
8039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8085,7 +8085,7 @@ def doRenewAddresses(args, parsed_globals):
|
|
8085
8085
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8086
8086
|
cred = credential.STSAssumeRoleCredential(
|
8087
8087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8088
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8088
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8089
8089
|
)
|
8090
8090
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8091
8091
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8137,7 +8137,7 @@ def doDescribeCcnRegionBandwidthLimits(args, parsed_globals):
|
|
8137
8137
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8138
8138
|
cred = credential.STSAssumeRoleCredential(
|
8139
8139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8140
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8140
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8141
8141
|
)
|
8142
8142
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8143
8143
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8189,7 +8189,7 @@ def doReplaceRouteTableAssociation(args, parsed_globals):
|
|
8189
8189
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8190
8190
|
cred = credential.STSAssumeRoleCredential(
|
8191
8191
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8192
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8192
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8193
8193
|
)
|
8194
8194
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8195
8195
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8241,7 +8241,7 @@ def doAssociateDhcpIpWithAddressIp(args, parsed_globals):
|
|
8241
8241
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8242
8242
|
cred = credential.STSAssumeRoleCredential(
|
8243
8243
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8244
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8244
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8245
8245
|
)
|
8246
8246
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8247
8247
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8293,7 +8293,7 @@ def doDescribeClassicLinkInstances(args, parsed_globals):
|
|
8293
8293
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8294
8294
|
cred = credential.STSAssumeRoleCredential(
|
8295
8295
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8296
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8296
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8297
8297
|
)
|
8298
8298
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8299
8299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8345,7 +8345,7 @@ def doDeleteServiceTemplate(args, parsed_globals):
|
|
8345
8345
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8346
8346
|
cred = credential.STSAssumeRoleCredential(
|
8347
8347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8348
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8348
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8349
8349
|
)
|
8350
8350
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8351
8351
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8397,7 +8397,7 @@ def doUnassignPrivateIpAddresses(args, parsed_globals):
|
|
8397
8397
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8398
8398
|
cred = credential.STSAssumeRoleCredential(
|
8399
8399
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8400
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8400
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8401
8401
|
)
|
8402
8402
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8403
8403
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8449,7 +8449,7 @@ def doModifyAddressTemplateGroupAttribute(args, parsed_globals):
|
|
8449
8449
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8450
8450
|
cred = credential.STSAssumeRoleCredential(
|
8451
8451
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8452
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8452
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8453
8453
|
)
|
8454
8454
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8455
8455
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8501,7 +8501,7 @@ def doEnableVpnGatewaySslClientCert(args, parsed_globals):
|
|
8501
8501
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8502
8502
|
cred = credential.STSAssumeRoleCredential(
|
8503
8503
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8504
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8504
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8505
8505
|
)
|
8506
8506
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8507
8507
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8553,7 +8553,7 @@ def doDescribeCcnRoutes(args, parsed_globals):
|
|
8553
8553
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8554
8554
|
cred = credential.STSAssumeRoleCredential(
|
8555
8555
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8556
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8556
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8557
8557
|
)
|
8558
8558
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8559
8559
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8605,7 +8605,7 @@ def doCreateVpcEndPointService(args, parsed_globals):
|
|
8605
8605
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8606
8606
|
cred = credential.STSAssumeRoleCredential(
|
8607
8607
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8608
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8608
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8609
8609
|
)
|
8610
8610
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8611
8611
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8657,7 +8657,7 @@ def doCreateIp6Translators(args, parsed_globals):
|
|
8657
8657
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8658
8658
|
cred = credential.STSAssumeRoleCredential(
|
8659
8659
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8660
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8660
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8661
8661
|
)
|
8662
8662
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8663
8663
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8709,7 +8709,7 @@ def doDescribeUsedIpAddress(args, parsed_globals):
|
|
8709
8709
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8710
8710
|
cred = credential.STSAssumeRoleCredential(
|
8711
8711
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8712
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8712
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8713
8713
|
)
|
8714
8714
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8715
8715
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8761,7 +8761,7 @@ def doCreateSecurityGroupWithPolicies(args, parsed_globals):
|
|
8761
8761
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8762
8762
|
cred = credential.STSAssumeRoleCredential(
|
8763
8763
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8764
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8764
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8765
8765
|
)
|
8766
8766
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8767
8767
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8813,7 +8813,7 @@ def doCreateAssistantCidr(args, parsed_globals):
|
|
8813
8813
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8814
8814
|
cred = credential.STSAssumeRoleCredential(
|
8815
8815
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8816
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8816
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8817
8817
|
)
|
8818
8818
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8819
8819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8865,7 +8865,7 @@ def doResetNatGatewayConnection(args, parsed_globals):
|
|
8865
8865
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8866
8866
|
cred = credential.STSAssumeRoleCredential(
|
8867
8867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8868
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8868
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8869
8869
|
)
|
8870
8870
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8871
8871
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8917,7 +8917,7 @@ def doCreateDefaultVpc(args, parsed_globals):
|
|
8917
8917
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8918
8918
|
cred = credential.STSAssumeRoleCredential(
|
8919
8919
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8920
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8920
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8921
8921
|
)
|
8922
8922
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8923
8923
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -8969,7 +8969,7 @@ def doAttachNetworkInterface(args, parsed_globals):
|
|
8969
8969
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8970
8970
|
cred = credential.STSAssumeRoleCredential(
|
8971
8971
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8972
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
8972
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8973
8973
|
)
|
8974
8974
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8975
8975
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9021,7 +9021,7 @@ def doDescribeVpnGatewaySslClients(args, parsed_globals):
|
|
9021
9021
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9022
9022
|
cred = credential.STSAssumeRoleCredential(
|
9023
9023
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9024
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9024
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9025
9025
|
)
|
9026
9026
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9027
9027
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9073,7 +9073,7 @@ def doGetCcnRegionBandwidthLimits(args, parsed_globals):
|
|
9073
9073
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9074
9074
|
cred = credential.STSAssumeRoleCredential(
|
9075
9075
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9076
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9076
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9077
9077
|
)
|
9078
9078
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9079
9079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9125,7 +9125,7 @@ def doDeleteSecurityGroupPolicies(args, parsed_globals):
|
|
9125
9125
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9126
9126
|
cred = credential.STSAssumeRoleCredential(
|
9127
9127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9128
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9128
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9129
9129
|
)
|
9130
9130
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9131
9131
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9177,7 +9177,7 @@ def doDescribeNetworkAclQuintupleEntries(args, parsed_globals):
|
|
9177
9177
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9178
9178
|
cred = credential.STSAssumeRoleCredential(
|
9179
9179
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9180
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9180
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9181
9181
|
)
|
9182
9182
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9183
9183
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9229,7 +9229,7 @@ def doDeleteNetDetect(args, parsed_globals):
|
|
9229
9229
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9230
9230
|
cred = credential.STSAssumeRoleCredential(
|
9231
9231
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9232
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9232
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9233
9233
|
)
|
9234
9234
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9235
9235
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9281,7 +9281,7 @@ def doModifySecurityGroupAttribute(args, parsed_globals):
|
|
9281
9281
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9282
9282
|
cred = credential.STSAssumeRoleCredential(
|
9283
9283
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9284
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9284
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9285
9285
|
)
|
9286
9286
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9287
9287
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9333,7 +9333,7 @@ def doDeleteAddressTemplate(args, parsed_globals):
|
|
9333
9333
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9334
9334
|
cred = credential.STSAssumeRoleCredential(
|
9335
9335
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9336
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9336
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9337
9337
|
)
|
9338
9338
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9339
9339
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9385,7 +9385,7 @@ def doNotifyRoutes(args, parsed_globals):
|
|
9385
9385
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9386
9386
|
cred = credential.STSAssumeRoleCredential(
|
9387
9387
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9388
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9388
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9389
9389
|
)
|
9390
9390
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9391
9391
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9437,7 +9437,7 @@ def doDeleteVpcEndPointService(args, parsed_globals):
|
|
9437
9437
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9438
9438
|
cred = credential.STSAssumeRoleCredential(
|
9439
9439
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9440
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9440
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9441
9441
|
)
|
9442
9442
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9443
9443
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9489,7 +9489,7 @@ def doCreateNetworkAclQuintupleEntries(args, parsed_globals):
|
|
9489
9489
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9490
9490
|
cred = credential.STSAssumeRoleCredential(
|
9491
9491
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9492
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9492
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9493
9493
|
)
|
9494
9494
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9495
9495
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9541,7 +9541,7 @@ def doDeleteVpcEndPoint(args, parsed_globals):
|
|
9541
9541
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9542
9542
|
cred = credential.STSAssumeRoleCredential(
|
9543
9543
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9544
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9544
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9545
9545
|
)
|
9546
9546
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9547
9547
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9593,7 +9593,7 @@ def doDeleteVpnGateway(args, parsed_globals):
|
|
9593
9593
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9594
9594
|
cred = credential.STSAssumeRoleCredential(
|
9595
9595
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9596
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9596
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9597
9597
|
)
|
9598
9598
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9599
9599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9645,7 +9645,7 @@ def doDescribeTenantCcns(args, parsed_globals):
|
|
9645
9645
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9646
9646
|
cred = credential.STSAssumeRoleCredential(
|
9647
9647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9648
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9648
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9649
9649
|
)
|
9650
9650
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9651
9651
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9697,7 +9697,7 @@ def doCreateServiceTemplate(args, parsed_globals):
|
|
9697
9697
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9698
9698
|
cred = credential.STSAssumeRoleCredential(
|
9699
9699
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9700
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9700
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9701
9701
|
)
|
9702
9702
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9703
9703
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9749,7 +9749,7 @@ def doCreateSnapshotPolicies(args, parsed_globals):
|
|
9749
9749
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9750
9750
|
cred = credential.STSAssumeRoleCredential(
|
9751
9751
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9752
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9752
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9753
9753
|
)
|
9754
9754
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9755
9755
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9801,7 +9801,7 @@ def doDeleteRoutes(args, parsed_globals):
|
|
9801
9801
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9802
9802
|
cred = credential.STSAssumeRoleCredential(
|
9803
9803
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9804
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9804
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9805
9805
|
)
|
9806
9806
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9807
9807
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9853,7 +9853,7 @@ def doModifyDirectConnectGatewayAttribute(args, parsed_globals):
|
|
9853
9853
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9854
9854
|
cred = credential.STSAssumeRoleCredential(
|
9855
9855
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9856
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9856
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9857
9857
|
)
|
9858
9858
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9859
9859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9905,7 +9905,7 @@ def doModifySubnetAttribute(args, parsed_globals):
|
|
9905
9905
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9906
9906
|
cred = credential.STSAssumeRoleCredential(
|
9907
9907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9908
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9908
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9909
9909
|
)
|
9910
9910
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9911
9911
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -9957,7 +9957,7 @@ def doDescribeSgSnapshotFileContent(args, parsed_globals):
|
|
9957
9957
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
9958
9958
|
cred = credential.STSAssumeRoleCredential(
|
9959
9959
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
9960
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
9960
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
9961
9961
|
)
|
9962
9962
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
9963
9963
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10009,7 +10009,7 @@ def doDescribeNetworkInterfaces(args, parsed_globals):
|
|
10009
10009
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10010
10010
|
cred = credential.STSAssumeRoleCredential(
|
10011
10011
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10012
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10012
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10013
10013
|
)
|
10014
10014
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10015
10015
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10061,7 +10061,7 @@ def doInquiryPriceRenewVpnGateway(args, parsed_globals):
|
|
10061
10061
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10062
10062
|
cred = credential.STSAssumeRoleCredential(
|
10063
10063
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10064
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10064
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10065
10065
|
)
|
10066
10066
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10067
10067
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10113,7 +10113,7 @@ def doDisableCcnRoutes(args, parsed_globals):
|
|
10113
10113
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10114
10114
|
cred = credential.STSAssumeRoleCredential(
|
10115
10115
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10116
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10116
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10117
10117
|
)
|
10118
10118
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10119
10119
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10165,7 +10165,7 @@ def doDescribeVpcEndPointServiceWhiteList(args, parsed_globals):
|
|
10165
10165
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10166
10166
|
cred = credential.STSAssumeRoleCredential(
|
10167
10167
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10168
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10168
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10169
10169
|
)
|
10170
10170
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10171
10171
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10217,7 +10217,7 @@ def doReleaseIp6AddressesBandwidth(args, parsed_globals):
|
|
10217
10217
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10218
10218
|
cred = credential.STSAssumeRoleCredential(
|
10219
10219
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10220
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10220
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10221
10221
|
)
|
10222
10222
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10223
10223
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10269,7 +10269,7 @@ def doModifySecurityGroupPolicies(args, parsed_globals):
|
|
10269
10269
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10270
10270
|
cred = credential.STSAssumeRoleCredential(
|
10271
10271
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10272
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10272
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10273
10273
|
)
|
10274
10274
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10275
10275
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10321,7 +10321,7 @@ def doResetVpnConnection(args, parsed_globals):
|
|
10321
10321
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10322
10322
|
cred = credential.STSAssumeRoleCredential(
|
10323
10323
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10324
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10324
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10325
10325
|
)
|
10326
10326
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10327
10327
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10373,7 +10373,7 @@ def doCreateCustomerGateway(args, parsed_globals):
|
|
10373
10373
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10374
10374
|
cred = credential.STSAssumeRoleCredential(
|
10375
10375
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10376
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10376
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10377
10377
|
)
|
10378
10378
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10379
10379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10425,7 +10425,7 @@ def doDescribeCrossBorderCompliance(args, parsed_globals):
|
|
10425
10425
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10426
10426
|
cred = credential.STSAssumeRoleCredential(
|
10427
10427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10428
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10428
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10429
10429
|
)
|
10430
10430
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10431
10431
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10477,7 +10477,7 @@ def doSetVpnGatewaysRenewFlag(args, parsed_globals):
|
|
10477
10477
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10478
10478
|
cred = credential.STSAssumeRoleCredential(
|
10479
10479
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10480
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10480
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10481
10481
|
)
|
10482
10482
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10483
10483
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10529,7 +10529,7 @@ def doReturnNormalAddresses(args, parsed_globals):
|
|
10529
10529
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10530
10530
|
cred = credential.STSAssumeRoleCredential(
|
10531
10531
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10532
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10532
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10533
10533
|
)
|
10534
10534
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10535
10535
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10581,7 +10581,7 @@ def doAuditCrossBorderCompliance(args, parsed_globals):
|
|
10581
10581
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10582
10582
|
cred = credential.STSAssumeRoleCredential(
|
10583
10583
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10584
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10584
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10585
10585
|
)
|
10586
10586
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10587
10587
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10633,7 +10633,7 @@ def doModifyNetworkInterfaceAttribute(args, parsed_globals):
|
|
10633
10633
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10634
10634
|
cred = credential.STSAssumeRoleCredential(
|
10635
10635
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10636
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10636
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10637
10637
|
)
|
10638
10638
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10639
10639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10685,7 +10685,7 @@ def doDescribeVpnGateways(args, parsed_globals):
|
|
10685
10685
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10686
10686
|
cred = credential.STSAssumeRoleCredential(
|
10687
10687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10688
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10688
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10689
10689
|
)
|
10690
10690
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10691
10691
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10737,7 +10737,7 @@ def doDisableFlowLogs(args, parsed_globals):
|
|
10737
10737
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10738
10738
|
cred = credential.STSAssumeRoleCredential(
|
10739
10739
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10740
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10740
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10741
10741
|
)
|
10742
10742
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10743
10743
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10789,7 +10789,7 @@ def doDownloadCustomerGatewayConfiguration(args, parsed_globals):
|
|
10789
10789
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10790
10790
|
cred = credential.STSAssumeRoleCredential(
|
10791
10791
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10792
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10792
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10793
10793
|
)
|
10794
10794
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10795
10795
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10841,7 +10841,7 @@ def doDescribeVpcInstances(args, parsed_globals):
|
|
10841
10841
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10842
10842
|
cred = credential.STSAssumeRoleCredential(
|
10843
10843
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10844
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10844
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10845
10845
|
)
|
10846
10846
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10847
10847
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10893,7 +10893,7 @@ def doAssociateNetworkInterfaceSecurityGroups(args, parsed_globals):
|
|
10893
10893
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10894
10894
|
cred = credential.STSAssumeRoleCredential(
|
10895
10895
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10896
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10896
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10897
10897
|
)
|
10898
10898
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10899
10899
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10945,7 +10945,7 @@ def doModifyVpcPeeringConnection(args, parsed_globals):
|
|
10945
10945
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10946
10946
|
cred = credential.STSAssumeRoleCredential(
|
10947
10947
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
10948
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
10948
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
10949
10949
|
)
|
10950
10950
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
10951
10951
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -10997,7 +10997,7 @@ def doDeleteRouteTable(args, parsed_globals):
|
|
10997
10997
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
10998
10998
|
cred = credential.STSAssumeRoleCredential(
|
10999
10999
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11000
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11000
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11001
11001
|
)
|
11002
11002
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11003
11003
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11049,7 +11049,7 @@ def doDescribeSecurityGroupLimits(args, parsed_globals):
|
|
11049
11049
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11050
11050
|
cred = credential.STSAssumeRoleCredential(
|
11051
11051
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11052
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11052
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11053
11053
|
)
|
11054
11054
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11055
11055
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11101,7 +11101,7 @@ def doDisassociateAddress(args, parsed_globals):
|
|
11101
11101
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11102
11102
|
cred = credential.STSAssumeRoleCredential(
|
11103
11103
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11104
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11104
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11105
11105
|
)
|
11106
11106
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11107
11107
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11153,7 +11153,7 @@ def doInquirePriceCreateDirectConnectGateway(args, parsed_globals):
|
|
11153
11153
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11154
11154
|
cred = credential.STSAssumeRoleCredential(
|
11155
11155
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11156
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11156
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11157
11157
|
)
|
11158
11158
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11159
11159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11205,7 +11205,7 @@ def doModifyIpv6AddressesAttribute(args, parsed_globals):
|
|
11205
11205
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11206
11206
|
cred = credential.STSAssumeRoleCredential(
|
11207
11207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11208
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11208
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11209
11209
|
)
|
11210
11210
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11211
11211
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11257,7 +11257,7 @@ def doCreateAddressTemplateGroup(args, parsed_globals):
|
|
11257
11257
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11258
11258
|
cred = credential.STSAssumeRoleCredential(
|
11259
11259
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11260
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11260
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11261
11261
|
)
|
11262
11262
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11263
11263
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11309,7 +11309,7 @@ def doDescribeSecurityGroupAssociationStatistics(args, parsed_globals):
|
|
11309
11309
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11310
11310
|
cred = credential.STSAssumeRoleCredential(
|
11311
11311
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11312
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11312
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11313
11313
|
)
|
11314
11314
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11315
11315
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11361,7 +11361,7 @@ def doRenewVpnGateway(args, parsed_globals):
|
|
11361
11361
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11362
11362
|
cred = credential.STSAssumeRoleCredential(
|
11363
11363
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11364
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11364
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11365
11365
|
)
|
11366
11366
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11367
11367
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11413,7 +11413,7 @@ def doAssignIpv6Addresses(args, parsed_globals):
|
|
11413
11413
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11414
11414
|
cred = credential.STSAssumeRoleCredential(
|
11415
11415
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11416
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11416
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11417
11417
|
)
|
11418
11418
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11419
11419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11465,7 +11465,7 @@ def doMigratePrivateIpAddress(args, parsed_globals):
|
|
11465
11465
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11466
11466
|
cred = credential.STSAssumeRoleCredential(
|
11467
11467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11468
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11468
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11469
11469
|
)
|
11470
11470
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11471
11471
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11517,7 +11517,7 @@ def doDescribeIpGeolocationInfos(args, parsed_globals):
|
|
11517
11517
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11518
11518
|
cred = credential.STSAssumeRoleCredential(
|
11519
11519
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11520
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11520
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11521
11521
|
)
|
11522
11522
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11523
11523
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11569,7 +11569,7 @@ def doDetachSnapshotInstances(args, parsed_globals):
|
|
11569
11569
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11570
11570
|
cred = credential.STSAssumeRoleCredential(
|
11571
11571
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11572
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11572
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11573
11573
|
)
|
11574
11574
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11575
11575
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11621,7 +11621,7 @@ def doDescribeServiceTemplates(args, parsed_globals):
|
|
11621
11621
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11622
11622
|
cred = credential.STSAssumeRoleCredential(
|
11623
11623
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11624
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11624
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11625
11625
|
)
|
11626
11626
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11627
11627
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11673,7 +11673,7 @@ def doUnassignIpv6CidrBlock(args, parsed_globals):
|
|
11673
11673
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11674
11674
|
cred = credential.STSAssumeRoleCredential(
|
11675
11675
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11676
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11676
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11677
11677
|
)
|
11678
11678
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11679
11679
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11725,7 +11725,7 @@ def doDescribeNatGatewayDirectConnectGatewayRoute(args, parsed_globals):
|
|
11725
11725
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11726
11726
|
cred = credential.STSAssumeRoleCredential(
|
11727
11727
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11728
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11728
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11729
11729
|
)
|
11730
11730
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11731
11731
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11777,7 +11777,7 @@ def doModifyNatGatewayDestinationIpPortTranslationNatRule(args, parsed_globals):
|
|
11777
11777
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11778
11778
|
cred = credential.STSAssumeRoleCredential(
|
11779
11779
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11780
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11780
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11781
11781
|
)
|
11782
11782
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11783
11783
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11829,7 +11829,7 @@ def doDescribeVpcLimits(args, parsed_globals):
|
|
11829
11829
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11830
11830
|
cred = credential.STSAssumeRoleCredential(
|
11831
11831
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11832
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11832
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11833
11833
|
)
|
11834
11834
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11835
11835
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11881,7 +11881,7 @@ def doHaVipAssociateAddressIp(args, parsed_globals):
|
|
11881
11881
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11882
11882
|
cred = credential.STSAssumeRoleCredential(
|
11883
11883
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11884
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11884
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11885
11885
|
)
|
11886
11886
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11887
11887
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11933,7 +11933,7 @@ def doCreateNatGatewaySourceIpTranslationNatRule(args, parsed_globals):
|
|
11933
11933
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11934
11934
|
cred = credential.STSAssumeRoleCredential(
|
11935
11935
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11936
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11936
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11937
11937
|
)
|
11938
11938
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11939
11939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -11985,7 +11985,7 @@ def doDescribeSnapshotAttachedInstances(args, parsed_globals):
|
|
11985
11985
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11986
11986
|
cred = credential.STSAssumeRoleCredential(
|
11987
11987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11988
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
11988
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11989
11989
|
)
|
11990
11990
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11991
11991
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12037,7 +12037,7 @@ def doRemoveIp6Rules(args, parsed_globals):
|
|
12037
12037
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12038
12038
|
cred = credential.STSAssumeRoleCredential(
|
12039
12039
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12040
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12040
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12041
12041
|
)
|
12042
12042
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12043
12043
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12089,7 +12089,7 @@ def doCheckDefaultSubnet(args, parsed_globals):
|
|
12089
12089
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12090
12090
|
cred = credential.STSAssumeRoleCredential(
|
12091
12091
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12092
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12092
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12093
12093
|
)
|
12094
12094
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12095
12095
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12141,7 +12141,7 @@ def doRejectVpcPeeringConnection(args, parsed_globals):
|
|
12141
12141
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12142
12142
|
cred = credential.STSAssumeRoleCredential(
|
12143
12143
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12144
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12144
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12145
12145
|
)
|
12146
12146
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12147
12147
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12193,7 +12193,7 @@ def doModifyCcnAttachedInstancesAttribute(args, parsed_globals):
|
|
12193
12193
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12194
12194
|
cred = credential.STSAssumeRoleCredential(
|
12195
12195
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12196
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12196
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12197
12197
|
)
|
12198
12198
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12199
12199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12245,7 +12245,7 @@ def doDownloadVpnGatewaySslClientCert(args, parsed_globals):
|
|
12245
12245
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12246
12246
|
cred = credential.STSAssumeRoleCredential(
|
12247
12247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12248
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12248
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12249
12249
|
)
|
12250
12250
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12251
12251
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12297,7 +12297,7 @@ def doDeleteHaVip(args, parsed_globals):
|
|
12297
12297
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12298
12298
|
cred = credential.STSAssumeRoleCredential(
|
12299
12299
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12300
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12300
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12301
12301
|
)
|
12302
12302
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12303
12303
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12349,7 +12349,7 @@ def doDescribeProductQuota(args, parsed_globals):
|
|
12349
12349
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12350
12350
|
cred = credential.STSAssumeRoleCredential(
|
12351
12351
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12352
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12352
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12353
12353
|
)
|
12354
12354
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12355
12355
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12401,7 +12401,7 @@ def doDescribeVpcPeeringConnections(args, parsed_globals):
|
|
12401
12401
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12402
12402
|
cred = credential.STSAssumeRoleCredential(
|
12403
12403
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12404
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12404
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12405
12405
|
)
|
12406
12406
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12407
12407
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12453,7 +12453,7 @@ def doInquiryPriceCreateVpnGateway(args, parsed_globals):
|
|
12453
12453
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12454
12454
|
cred = credential.STSAssumeRoleCredential(
|
12455
12455
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12456
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12456
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12457
12457
|
)
|
12458
12458
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12459
12459
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12505,7 +12505,7 @@ def doModifyBandwidthPackageAttribute(args, parsed_globals):
|
|
12505
12505
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12506
12506
|
cred = credential.STSAssumeRoleCredential(
|
12507
12507
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12508
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12508
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12509
12509
|
)
|
12510
12510
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12511
12511
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12557,7 +12557,7 @@ def doDescribeAddressQuota(args, parsed_globals):
|
|
12557
12557
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12558
12558
|
cred = credential.STSAssumeRoleCredential(
|
12559
12559
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12560
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12560
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12561
12561
|
)
|
12562
12562
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12563
12563
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12609,7 +12609,7 @@ def doCreateVpnGatewaySslServer(args, parsed_globals):
|
|
12609
12609
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12610
12610
|
cred = credential.STSAssumeRoleCredential(
|
12611
12611
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12612
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12612
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12613
12613
|
)
|
12614
12614
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12615
12615
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12661,7 +12661,7 @@ def doModifyVpnGatewayAttribute(args, parsed_globals):
|
|
12661
12661
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12662
12662
|
cred = credential.STSAssumeRoleCredential(
|
12663
12663
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12664
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12664
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12665
12665
|
)
|
12666
12666
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12667
12667
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12713,7 +12713,7 @@ def doResetVpnGatewayInternetMaxBandwidth(args, parsed_globals):
|
|
12713
12713
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12714
12714
|
cred = credential.STSAssumeRoleCredential(
|
12715
12715
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12716
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12716
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12717
12717
|
)
|
12718
12718
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12719
12719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12765,7 +12765,7 @@ def doDeleteVpc(args, parsed_globals):
|
|
12765
12765
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12766
12766
|
cred = credential.STSAssumeRoleCredential(
|
12767
12767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12768
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12768
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12769
12769
|
)
|
12770
12770
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12771
12771
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12817,7 +12817,7 @@ def doDescribeSubnets(args, parsed_globals):
|
|
12817
12817
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12818
12818
|
cred = credential.STSAssumeRoleCredential(
|
12819
12819
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12820
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12820
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12821
12821
|
)
|
12822
12822
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12823
12823
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12869,7 +12869,7 @@ def doCreateCcn(args, parsed_globals):
|
|
12869
12869
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12870
12870
|
cred = credential.STSAssumeRoleCredential(
|
12871
12871
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12872
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12872
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12873
12873
|
)
|
12874
12874
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12875
12875
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12921,7 +12921,7 @@ def doModifyCustomerGatewayAttribute(args, parsed_globals):
|
|
12921
12921
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12922
12922
|
cred = credential.STSAssumeRoleCredential(
|
12923
12923
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12924
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12924
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12925
12925
|
)
|
12926
12926
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12927
12927
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -12973,7 +12973,7 @@ def doReplaceDirectConnectGatewayCcnRoutes(args, parsed_globals):
|
|
12973
12973
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
12974
12974
|
cred = credential.STSAssumeRoleCredential(
|
12975
12975
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
12976
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
12976
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
12977
12977
|
)
|
12978
12978
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
12979
12979
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13025,7 +13025,7 @@ def doDescribeNetworkAcls(args, parsed_globals):
|
|
13025
13025
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13026
13026
|
cred = credential.STSAssumeRoleCredential(
|
13027
13027
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13028
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13028
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13029
13029
|
)
|
13030
13030
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13031
13031
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13077,7 +13077,7 @@ def doModifyVpnConnectionAttribute(args, parsed_globals):
|
|
13077
13077
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13078
13078
|
cred = credential.STSAssumeRoleCredential(
|
13079
13079
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13080
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13080
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13081
13081
|
)
|
13082
13082
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13083
13083
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13129,7 +13129,7 @@ def doDescribeSecurityGroups(args, parsed_globals):
|
|
13129
13129
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13130
13130
|
cred = credential.STSAssumeRoleCredential(
|
13131
13131
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13132
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13132
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13133
13133
|
)
|
13134
13134
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13135
13135
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13181,7 +13181,7 @@ def doCreateVpnGateway(args, parsed_globals):
|
|
13181
13181
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13182
13182
|
cred = credential.STSAssumeRoleCredential(
|
13183
13183
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13184
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13184
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13185
13185
|
)
|
13186
13186
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13187
13187
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13233,7 +13233,7 @@ def doDescribeTrafficPackages(args, parsed_globals):
|
|
13233
13233
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13234
13234
|
cred = credential.STSAssumeRoleCredential(
|
13235
13235
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13236
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13236
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13237
13237
|
)
|
13238
13238
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13239
13239
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13285,7 +13285,7 @@ def doModifyPrivateIpAddressesAttribute(args, parsed_globals):
|
|
13285
13285
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13286
13286
|
cred = credential.STSAssumeRoleCredential(
|
13287
13287
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13288
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13288
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13289
13289
|
)
|
13290
13290
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13291
13291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13337,7 +13337,7 @@ def doCreateDirectConnectGatewayCcnRoutes(args, parsed_globals):
|
|
13337
13337
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13338
13338
|
cred = credential.STSAssumeRoleCredential(
|
13339
13339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13340
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13340
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13341
13341
|
)
|
13342
13342
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13343
13343
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13389,7 +13389,7 @@ def doDescribeSubnetResourceDashboard(args, parsed_globals):
|
|
13389
13389
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13390
13390
|
cred = credential.STSAssumeRoleCredential(
|
13391
13391
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13392
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13392
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13393
13393
|
)
|
13394
13394
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13395
13395
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13441,7 +13441,7 @@ def doCreateLocalGateway(args, parsed_globals):
|
|
13441
13441
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13442
13442
|
cred = credential.STSAssumeRoleCredential(
|
13443
13443
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13444
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13444
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13445
13445
|
)
|
13446
13446
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13447
13447
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13493,7 +13493,7 @@ def doModifyNetworkInterfaceQos(args, parsed_globals):
|
|
13493
13493
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13494
13494
|
cred = credential.STSAssumeRoleCredential(
|
13495
13495
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13496
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13496
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13497
13497
|
)
|
13498
13498
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13499
13499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13545,7 +13545,7 @@ def doDetachCcnInstances(args, parsed_globals):
|
|
13545
13545
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13546
13546
|
cred = credential.STSAssumeRoleCredential(
|
13547
13547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13548
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13548
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13549
13549
|
)
|
13550
13550
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13551
13551
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13597,7 +13597,7 @@ def doDetachClassicLinkVpc(args, parsed_globals):
|
|
13597
13597
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13598
13598
|
cred = credential.STSAssumeRoleCredential(
|
13599
13599
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13600
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13600
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13601
13601
|
)
|
13602
13602
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13603
13603
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13649,7 +13649,7 @@ def doDescribeVpnGatewaySslServers(args, parsed_globals):
|
|
13649
13649
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13650
13650
|
cred = credential.STSAssumeRoleCredential(
|
13651
13651
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13652
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13652
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13653
13653
|
)
|
13654
13654
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13655
13655
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13701,7 +13701,7 @@ def doRefreshDirectConnectGatewayRouteToNatGateway(args, parsed_globals):
|
|
13701
13701
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13702
13702
|
cred = credential.STSAssumeRoleCredential(
|
13703
13703
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13704
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13704
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13705
13705
|
)
|
13706
13706
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13707
13707
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13753,7 +13753,7 @@ def doDisassociateDhcpIpWithAddressIp(args, parsed_globals):
|
|
13753
13753
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13754
13754
|
cred = credential.STSAssumeRoleCredential(
|
13755
13755
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13756
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13756
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13757
13757
|
)
|
13758
13758
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13759
13759
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13805,7 +13805,7 @@ def doCreateHaVip(args, parsed_globals):
|
|
13805
13805
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13806
13806
|
cred = credential.STSAssumeRoleCredential(
|
13807
13807
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13808
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13808
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13809
13809
|
)
|
13810
13810
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13811
13811
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13857,7 +13857,7 @@ def doModifyServiceTemplateAttribute(args, parsed_globals):
|
|
13857
13857
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13858
13858
|
cred = credential.STSAssumeRoleCredential(
|
13859
13859
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13860
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13860
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13861
13861
|
)
|
13862
13862
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13863
13863
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13909,7 +13909,7 @@ def doMigrateNetworkInterface(args, parsed_globals):
|
|
13909
13909
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13910
13910
|
cred = credential.STSAssumeRoleCredential(
|
13911
13911
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13912
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13912
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13913
13913
|
)
|
13914
13914
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13915
13915
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -13961,7 +13961,7 @@ def doReleaseAddresses(args, parsed_globals):
|
|
13961
13961
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13962
13962
|
cred = credential.STSAssumeRoleCredential(
|
13963
13963
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13964
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
13964
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13965
13965
|
)
|
13966
13966
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13967
13967
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14013,7 +14013,7 @@ def doDisassociateNetworkAclSubnets(args, parsed_globals):
|
|
14013
14013
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14014
14014
|
cred = credential.STSAssumeRoleCredential(
|
14015
14015
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14016
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14016
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14017
14017
|
)
|
14018
14018
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14019
14019
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14065,7 +14065,7 @@ def doDescribeNatGatewaySourceIpTranslationNatRules(args, parsed_globals):
|
|
14065
14065
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14066
14066
|
cred = credential.STSAssumeRoleCredential(
|
14067
14067
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14068
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14068
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14069
14069
|
)
|
14070
14070
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14071
14071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14117,7 +14117,7 @@ def doEnableCcnRoutes(args, parsed_globals):
|
|
14117
14117
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14118
14118
|
cred = credential.STSAssumeRoleCredential(
|
14119
14119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14120
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14120
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14121
14121
|
)
|
14122
14122
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14123
14123
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14169,7 +14169,7 @@ def doModifyRouteTableAttribute(args, parsed_globals):
|
|
14169
14169
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14170
14170
|
cred = credential.STSAssumeRoleCredential(
|
14171
14171
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14172
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14172
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14173
14173
|
)
|
14174
14174
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14175
14175
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14221,7 +14221,7 @@ def doDisassociateDirectConnectGatewayNatGateway(args, parsed_globals):
|
|
14221
14221
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14222
14222
|
cred = credential.STSAssumeRoleCredential(
|
14223
14223
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14224
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14224
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14225
14225
|
)
|
14226
14226
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14227
14227
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14273,7 +14273,7 @@ def doCreateNatGateway(args, parsed_globals):
|
|
14273
14273
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14274
14274
|
cred = credential.STSAssumeRoleCredential(
|
14275
14275
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14276
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14276
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14277
14277
|
)
|
14278
14278
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14279
14279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14325,7 +14325,7 @@ def doModifyNetDetect(args, parsed_globals):
|
|
14325
14325
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14326
14326
|
cred = credential.STSAssumeRoleCredential(
|
14327
14327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14328
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14328
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14329
14329
|
)
|
14330
14330
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14331
14331
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14377,7 +14377,7 @@ def doDisableGatewayFlowMonitor(args, parsed_globals):
|
|
14377
14377
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14378
14378
|
cred = credential.STSAssumeRoleCredential(
|
14379
14379
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14380
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14380
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14381
14381
|
)
|
14382
14382
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14383
14383
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14429,7 +14429,7 @@ def doLockCcns(args, parsed_globals):
|
|
14429
14429
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14430
14430
|
cred = credential.STSAssumeRoleCredential(
|
14431
14431
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14432
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14432
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14433
14433
|
)
|
14434
14434
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14435
14435
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14481,7 +14481,7 @@ def doDeleteNatGatewayDestinationIpPortTranslationNatRule(args, parsed_globals):
|
|
14481
14481
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14482
14482
|
cred = credential.STSAssumeRoleCredential(
|
14483
14483
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14484
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14484
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14485
14485
|
)
|
14486
14486
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14487
14487
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14533,7 +14533,7 @@ def doAddTemplateMember(args, parsed_globals):
|
|
14533
14533
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14534
14534
|
cred = credential.STSAssumeRoleCredential(
|
14535
14535
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14536
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14536
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14537
14537
|
)
|
14538
14538
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14539
14539
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14585,7 +14585,7 @@ def doCreateNetDetect(args, parsed_globals):
|
|
14585
14585
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14586
14586
|
cred = credential.STSAssumeRoleCredential(
|
14587
14587
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14588
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14588
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14589
14589
|
)
|
14590
14590
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14591
14591
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14637,7 +14637,7 @@ def doCreateTrafficPackages(args, parsed_globals):
|
|
14637
14637
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14638
14638
|
cred = credential.STSAssumeRoleCredential(
|
14639
14639
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14640
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14640
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14641
14641
|
)
|
14642
14642
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14643
14643
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14689,7 +14689,7 @@ def doCreateRoutes(args, parsed_globals):
|
|
14689
14689
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14690
14690
|
cred = credential.STSAssumeRoleCredential(
|
14691
14691
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14692
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14692
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14693
14693
|
)
|
14694
14694
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14695
14695
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14741,7 +14741,7 @@ def doDescribeBandwidthPackageQuota(args, parsed_globals):
|
|
14741
14741
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14742
14742
|
cred = credential.STSAssumeRoleCredential(
|
14743
14743
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14744
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14744
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14745
14745
|
)
|
14746
14746
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14747
14747
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14793,7 +14793,7 @@ def doModifyHaVipAttribute(args, parsed_globals):
|
|
14793
14793
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14794
14794
|
cred = credential.STSAssumeRoleCredential(
|
14795
14795
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14796
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14796
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14797
14797
|
)
|
14798
14798
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14799
14799
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14845,7 +14845,7 @@ def doResetAttachCcnInstances(args, parsed_globals):
|
|
14845
14845
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14846
14846
|
cred = credential.STSAssumeRoleCredential(
|
14847
14847
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14848
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14848
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14849
14849
|
)
|
14850
14850
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14851
14851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14897,7 +14897,7 @@ def doModifyVpcEndPointServiceAttribute(args, parsed_globals):
|
|
14897
14897
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14898
14898
|
cred = credential.STSAssumeRoleCredential(
|
14899
14899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14900
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14900
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14901
14901
|
)
|
14902
14902
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14903
14903
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -14949,7 +14949,7 @@ def doDescribeBandwidthPackages(args, parsed_globals):
|
|
14949
14949
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14950
14950
|
cred = credential.STSAssumeRoleCredential(
|
14951
14951
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14952
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
14952
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14953
14953
|
)
|
14954
14954
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14955
14955
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15001,7 +15001,7 @@ def doCreateServiceTemplateGroup(args, parsed_globals):
|
|
15001
15001
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15002
15002
|
cred = credential.STSAssumeRoleCredential(
|
15003
15003
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15004
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15004
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15005
15005
|
)
|
15006
15006
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15007
15007
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15053,7 +15053,7 @@ def doModifyAssistantCidr(args, parsed_globals):
|
|
15053
15053
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15054
15054
|
cred = credential.STSAssumeRoleCredential(
|
15055
15055
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15056
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15056
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15057
15057
|
)
|
15058
15058
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15059
15059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15105,7 +15105,7 @@ def doCreateDhcpIp(args, parsed_globals):
|
|
15105
15105
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15106
15106
|
cred = credential.STSAssumeRoleCredential(
|
15107
15107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15108
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15108
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15109
15109
|
)
|
15110
15110
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15111
15111
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15157,7 +15157,7 @@ def doReplaceRoutes(args, parsed_globals):
|
|
15157
15157
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15158
15158
|
cred = credential.STSAssumeRoleCredential(
|
15159
15159
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15160
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15160
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15161
15161
|
)
|
15162
15162
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15163
15163
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15209,7 +15209,7 @@ def doModifyCcnAttribute(args, parsed_globals):
|
|
15209
15209
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15210
15210
|
cred = credential.STSAssumeRoleCredential(
|
15211
15211
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15212
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15212
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15213
15213
|
)
|
15214
15214
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15215
15215
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15261,7 +15261,7 @@ def doResumeSnapshotInstance(args, parsed_globals):
|
|
15261
15261
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15262
15262
|
cred = credential.STSAssumeRoleCredential(
|
15263
15263
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15264
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15264
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15265
15265
|
)
|
15266
15266
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15267
15267
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15313,7 +15313,7 @@ def doDescribeVpcPrivateIpAddresses(args, parsed_globals):
|
|
15313
15313
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15314
15314
|
cred = credential.STSAssumeRoleCredential(
|
15315
15315
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15316
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15316
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15317
15317
|
)
|
15318
15318
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15319
15319
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15365,7 +15365,7 @@ def doModifyIp6Translator(args, parsed_globals):
|
|
15365
15365
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15366
15366
|
cred = credential.STSAssumeRoleCredential(
|
15367
15367
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15368
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15368
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15369
15369
|
)
|
15370
15370
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15371
15371
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15417,7 +15417,7 @@ def doUnassignIpv6SubnetCidrBlock(args, parsed_globals):
|
|
15417
15417
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15418
15418
|
cred = credential.STSAssumeRoleCredential(
|
15419
15419
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15420
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15420
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15421
15421
|
)
|
15422
15422
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15423
15423
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15469,7 +15469,7 @@ def doDescribeSnapshotFiles(args, parsed_globals):
|
|
15469
15469
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15470
15470
|
cred = credential.STSAssumeRoleCredential(
|
15471
15471
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15472
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15472
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15473
15473
|
)
|
15474
15474
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15475
15475
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15521,7 +15521,7 @@ def doDescribeBandwidthPackageBillUsage(args, parsed_globals):
|
|
15521
15521
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15522
15522
|
cred = credential.STSAssumeRoleCredential(
|
15523
15523
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15524
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15524
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15525
15525
|
)
|
15526
15526
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15527
15527
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15573,7 +15573,7 @@ def doDescribeIpGeolocationDatabaseUrl(args, parsed_globals):
|
|
15573
15573
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15574
15574
|
cred = credential.STSAssumeRoleCredential(
|
15575
15575
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15576
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15576
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15577
15577
|
)
|
15578
15578
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15579
15579
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15625,7 +15625,7 @@ def doModifyIp6AddressesBandwidth(args, parsed_globals):
|
|
15625
15625
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15626
15626
|
cred = credential.STSAssumeRoleCredential(
|
15627
15627
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15628
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15628
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15629
15629
|
)
|
15630
15630
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15631
15631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15677,7 +15677,7 @@ def doDescribeAddressTemplates(args, parsed_globals):
|
|
15677
15677
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15678
15678
|
cred = credential.STSAssumeRoleCredential(
|
15679
15679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15680
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15680
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15681
15681
|
)
|
15682
15682
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15683
15683
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15729,7 +15729,7 @@ def doCreateAddressTemplate(args, parsed_globals):
|
|
15729
15729
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15730
15730
|
cred = credential.STSAssumeRoleCredential(
|
15731
15731
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15732
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15732
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15733
15733
|
)
|
15734
15734
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15735
15735
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15781,7 +15781,7 @@ def doModifyAddressAttribute(args, parsed_globals):
|
|
15781
15781
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15782
15782
|
cred = credential.STSAssumeRoleCredential(
|
15783
15783
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15784
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15784
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15785
15785
|
)
|
15786
15786
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15787
15787
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15833,7 +15833,7 @@ def doDescribeAddressTemplateGroups(args, parsed_globals):
|
|
15833
15833
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15834
15834
|
cred = credential.STSAssumeRoleCredential(
|
15835
15835
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15836
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15836
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15837
15837
|
)
|
15838
15838
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15839
15839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15885,7 +15885,7 @@ def doCreateVpcEndPoint(args, parsed_globals):
|
|
15885
15885
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15886
15886
|
cred = credential.STSAssumeRoleCredential(
|
15887
15887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15888
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15888
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15889
15889
|
)
|
15890
15890
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15891
15891
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15937,7 +15937,7 @@ def doTransformAddress(args, parsed_globals):
|
|
15937
15937
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15938
15938
|
cred = credential.STSAssumeRoleCredential(
|
15939
15939
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15940
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15940
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15941
15941
|
)
|
15942
15942
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15943
15943
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -15989,7 +15989,7 @@ def doDescribeIp6TranslatorQuota(args, parsed_globals):
|
|
15989
15989
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15990
15990
|
cred = credential.STSAssumeRoleCredential(
|
15991
15991
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15992
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
15992
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15993
15993
|
)
|
15994
15994
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15995
15995
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16041,7 +16041,7 @@ def doCreateSecurityGroupPolicies(args, parsed_globals):
|
|
16041
16041
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16042
16042
|
cred = credential.STSAssumeRoleCredential(
|
16043
16043
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16044
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16044
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16045
16045
|
)
|
16046
16046
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16047
16047
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16093,7 +16093,7 @@ def doModifyNetworkAclAttribute(args, parsed_globals):
|
|
16093
16093
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16094
16094
|
cred = credential.STSAssumeRoleCredential(
|
16095
16095
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16096
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16096
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16097
16097
|
)
|
16098
16098
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16099
16099
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16145,7 +16145,7 @@ def doSetCcnRegionBandwidthLimits(args, parsed_globals):
|
|
16145
16145
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16146
16146
|
cred = credential.STSAssumeRoleCredential(
|
16147
16147
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16148
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16148
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16149
16149
|
)
|
16150
16150
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16151
16151
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16197,7 +16197,7 @@ def doCreateSecurityGroup(args, parsed_globals):
|
|
16197
16197
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16198
16198
|
cred = credential.STSAssumeRoleCredential(
|
16199
16199
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16200
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16200
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16201
16201
|
)
|
16202
16202
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16203
16203
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16249,7 +16249,7 @@ def doDisableRoutes(args, parsed_globals):
|
|
16249
16249
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16250
16250
|
cred = credential.STSAssumeRoleCredential(
|
16251
16251
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16252
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16252
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16253
16253
|
)
|
16254
16254
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16255
16255
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16301,7 +16301,7 @@ def doDescribeVpcEndPoint(args, parsed_globals):
|
|
16301
16301
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16302
16302
|
cred = credential.STSAssumeRoleCredential(
|
16303
16303
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16304
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16304
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16305
16305
|
)
|
16306
16306
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16307
16307
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16353,7 +16353,7 @@ def doAttachSnapshotInstances(args, parsed_globals):
|
|
16353
16353
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16354
16354
|
cred = credential.STSAssumeRoleCredential(
|
16355
16355
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16356
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16356
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16357
16357
|
)
|
16358
16358
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16359
16359
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16405,7 +16405,7 @@ def doCreateVpcEndPointServiceWhiteList(args, parsed_globals):
|
|
16405
16405
|
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16406
16406
|
cred = credential.STSAssumeRoleCredential(
|
16407
16407
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16408
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
16408
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16409
16409
|
)
|
16410
16410
|
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16411
16411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
@@ -16856,6 +16856,7 @@ def parse_global_arg(parsed_globals):
|
|
16856
16856
|
|
16857
16857
|
if g_param[OptionsDefine.Endpoint] is None:
|
16858
16858
|
g_param[OptionsDefine.Endpoint] = conf["vpc"][OptionsDefine.Endpoint]
|
16859
|
+
g_param["sts_cred_endpoint"] = conf.get("sts", {}).get("endpoint")
|
16859
16860
|
except Exception as err:
|
16860
16861
|
raise ConfigurationError("config file:%s error, %s" % (conf_path, str(err)))
|
16861
16862
|
|