tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/es/es_client.py
CHANGED
|
@@ -29,7 +29,10 @@ def doDiagnoseInstance(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -41,7 +44,7 @@ def doDiagnoseInstance(args, parsed_globals):
|
|
|
41
44
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
42
45
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
43
46
|
)
|
|
44
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
47
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
45
48
|
if g_param[OptionsDefine.Language]:
|
|
46
49
|
profile.language = g_param[OptionsDefine.Language]
|
|
47
50
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -81,7 +84,10 @@ def doDeleteLogstashInstance(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -93,7 +99,7 @@ def doDeleteLogstashInstance(args, parsed_globals):
|
|
|
93
99
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
94
100
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
95
101
|
)
|
|
96
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
102
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
97
103
|
if g_param[OptionsDefine.Language]:
|
|
98
104
|
profile.language = g_param[OptionsDefine.Language]
|
|
99
105
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -133,7 +139,10 @@ def doDeleteInstance(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -145,7 +154,7 @@ def doDeleteInstance(args, parsed_globals):
|
|
|
145
154
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
146
155
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
147
156
|
)
|
|
148
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
157
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
149
158
|
if g_param[OptionsDefine.Language]:
|
|
150
159
|
profile.language = g_param[OptionsDefine.Language]
|
|
151
160
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -185,7 +194,10 @@ def doGetRequestTargetNodeTypes(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -197,7 +209,7 @@ def doGetRequestTargetNodeTypes(args, parsed_globals):
|
|
|
197
209
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
198
210
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
199
211
|
)
|
|
200
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
212
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
201
213
|
if g_param[OptionsDefine.Language]:
|
|
202
214
|
profile.language = g_param[OptionsDefine.Language]
|
|
203
215
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -237,7 +249,10 @@ def doStopLogstashPipelines(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -249,7 +264,7 @@ def doStopLogstashPipelines(args, parsed_globals):
|
|
|
249
264
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
250
265
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
251
266
|
)
|
|
252
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
267
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
253
268
|
if g_param[OptionsDefine.Language]:
|
|
254
269
|
profile.language = g_param[OptionsDefine.Language]
|
|
255
270
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -289,7 +304,10 @@ def doDescribeServerlessSpaces(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -301,7 +319,7 @@ def doDescribeServerlessSpaces(args, parsed_globals):
|
|
|
301
319
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
302
320
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
303
321
|
)
|
|
304
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
322
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
305
323
|
if g_param[OptionsDefine.Language]:
|
|
306
324
|
profile.language = g_param[OptionsDefine.Language]
|
|
307
325
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -331,6 +349,61 @@ def doDescribeServerlessSpaces(args, parsed_globals):
|
|
|
331
349
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
332
350
|
|
|
333
351
|
|
|
352
|
+
def doExportIpTraceLog(args, parsed_globals):
|
|
353
|
+
g_param = parse_global_arg(parsed_globals)
|
|
354
|
+
|
|
355
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
356
|
+
cred = credential.CVMRoleCredential()
|
|
357
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
358
|
+
cred = credential.STSAssumeRoleCredential(
|
|
359
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
360
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
361
|
+
)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
366
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
367
|
+
else:
|
|
368
|
+
cred = credential.Credential(
|
|
369
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
370
|
+
)
|
|
371
|
+
http_profile = HttpProfile(
|
|
372
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
373
|
+
reqMethod="POST",
|
|
374
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
375
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
376
|
+
)
|
|
377
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
378
|
+
if g_param[OptionsDefine.Language]:
|
|
379
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
380
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
381
|
+
client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
382
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
383
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
384
|
+
model = models.ExportIpTraceLogRequest()
|
|
385
|
+
model.from_json_string(json.dumps(args))
|
|
386
|
+
start_time = time.time()
|
|
387
|
+
while True:
|
|
388
|
+
rsp = client.ExportIpTraceLog(model)
|
|
389
|
+
result = rsp.to_json_string()
|
|
390
|
+
try:
|
|
391
|
+
json_obj = json.loads(result)
|
|
392
|
+
except TypeError as e:
|
|
393
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
394
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
395
|
+
break
|
|
396
|
+
cur_time = time.time()
|
|
397
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
398
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
399
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
400
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
401
|
+
else:
|
|
402
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
403
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
404
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
405
|
+
|
|
406
|
+
|
|
334
407
|
def doInstallInstanceModel(args, parsed_globals):
|
|
335
408
|
g_param = parse_global_arg(parsed_globals)
|
|
336
409
|
|
|
@@ -341,7 +414,10 @@ def doInstallInstanceModel(args, parsed_globals):
|
|
|
341
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
416
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
422
|
else:
|
|
347
423
|
cred = credential.Credential(
|
|
@@ -353,7 +429,7 @@ def doInstallInstanceModel(args, parsed_globals):
|
|
|
353
429
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
354
430
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
355
431
|
)
|
|
356
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
432
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
357
433
|
if g_param[OptionsDefine.Language]:
|
|
358
434
|
profile.language = g_param[OptionsDefine.Language]
|
|
359
435
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -393,7 +469,10 @@ def doDescribeIndexList(args, parsed_globals):
|
|
|
393
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
471
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
477
|
else:
|
|
399
478
|
cred = credential.Credential(
|
|
@@ -405,7 +484,7 @@ def doDescribeIndexList(args, parsed_globals):
|
|
|
405
484
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
406
485
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
407
486
|
)
|
|
408
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
487
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
409
488
|
if g_param[OptionsDefine.Language]:
|
|
410
489
|
profile.language = g_param[OptionsDefine.Language]
|
|
411
490
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -445,7 +524,10 @@ def doDescribeInstanceOperations(args, parsed_globals):
|
|
|
445
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
526
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
532
|
else:
|
|
451
533
|
cred = credential.Credential(
|
|
@@ -457,7 +539,7 @@ def doDescribeInstanceOperations(args, parsed_globals):
|
|
|
457
539
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
458
540
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
459
541
|
)
|
|
460
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
542
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
461
543
|
if g_param[OptionsDefine.Language]:
|
|
462
544
|
profile.language = g_param[OptionsDefine.Language]
|
|
463
545
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -497,7 +579,10 @@ def doDescribeLogstashInstances(args, parsed_globals):
|
|
|
497
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
581
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
587
|
else:
|
|
503
588
|
cred = credential.Credential(
|
|
@@ -509,7 +594,7 @@ def doDescribeLogstashInstances(args, parsed_globals):
|
|
|
509
594
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
510
595
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
511
596
|
)
|
|
512
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
597
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
513
598
|
if g_param[OptionsDefine.Language]:
|
|
514
599
|
profile.language = g_param[OptionsDefine.Language]
|
|
515
600
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -549,7 +634,10 @@ def doRestoreClusterSnapshot(args, parsed_globals):
|
|
|
549
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
636
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
642
|
else:
|
|
555
643
|
cred = credential.Credential(
|
|
@@ -561,7 +649,7 @@ def doRestoreClusterSnapshot(args, parsed_globals):
|
|
|
561
649
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
562
650
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
563
651
|
)
|
|
564
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
652
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
565
653
|
if g_param[OptionsDefine.Language]:
|
|
566
654
|
profile.language = g_param[OptionsDefine.Language]
|
|
567
655
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -601,7 +689,10 @@ def doGetDiagnoseSettings(args, parsed_globals):
|
|
|
601
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
691
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
697
|
else:
|
|
607
698
|
cred = credential.Credential(
|
|
@@ -613,7 +704,7 @@ def doGetDiagnoseSettings(args, parsed_globals):
|
|
|
613
704
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
614
705
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
615
706
|
)
|
|
616
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
707
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
617
708
|
if g_param[OptionsDefine.Language]:
|
|
618
709
|
profile.language = g_param[OptionsDefine.Language]
|
|
619
710
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -653,7 +744,10 @@ def doCreateIndex(args, parsed_globals):
|
|
|
653
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
746
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
752
|
else:
|
|
659
753
|
cred = credential.Credential(
|
|
@@ -665,7 +759,7 @@ def doCreateIndex(args, parsed_globals):
|
|
|
665
759
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
666
760
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
667
761
|
)
|
|
668
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
762
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
669
763
|
if g_param[OptionsDefine.Language]:
|
|
670
764
|
profile.language = g_param[OptionsDefine.Language]
|
|
671
765
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -705,7 +799,10 @@ def doUpdateDiagnoseSettings(args, parsed_globals):
|
|
|
705
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
801
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
807
|
else:
|
|
711
808
|
cred = credential.Credential(
|
|
@@ -717,7 +814,7 @@ def doUpdateDiagnoseSettings(args, parsed_globals):
|
|
|
717
814
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
718
815
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
719
816
|
)
|
|
720
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
817
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
721
818
|
if g_param[OptionsDefine.Language]:
|
|
722
819
|
profile.language = g_param[OptionsDefine.Language]
|
|
723
820
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -757,7 +854,10 @@ def doCreateCosMigrateToServerlessInstance(args, parsed_globals):
|
|
|
757
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
856
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
862
|
else:
|
|
763
863
|
cred = credential.Credential(
|
|
@@ -769,7 +869,7 @@ def doCreateCosMigrateToServerlessInstance(args, parsed_globals):
|
|
|
769
869
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
770
870
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
771
871
|
)
|
|
772
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
872
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
773
873
|
if g_param[OptionsDefine.Language]:
|
|
774
874
|
profile.language = g_param[OptionsDefine.Language]
|
|
775
875
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -809,7 +909,10 @@ def doUpdatePlugins(args, parsed_globals):
|
|
|
809
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
911
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
917
|
else:
|
|
815
918
|
cred = credential.Credential(
|
|
@@ -821,7 +924,7 @@ def doUpdatePlugins(args, parsed_globals):
|
|
|
821
924
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
822
925
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
823
926
|
)
|
|
824
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
825
928
|
if g_param[OptionsDefine.Language]:
|
|
826
929
|
profile.language = g_param[OptionsDefine.Language]
|
|
827
930
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -861,7 +964,10 @@ def doGetDocumentParseResult(args, parsed_globals):
|
|
|
861
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
966
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
972
|
else:
|
|
867
973
|
cred = credential.Credential(
|
|
@@ -873,7 +979,7 @@ def doGetDocumentParseResult(args, parsed_globals):
|
|
|
873
979
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
874
980
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
875
981
|
)
|
|
876
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
877
983
|
if g_param[OptionsDefine.Language]:
|
|
878
984
|
profile.language = g_param[OptionsDefine.Language]
|
|
879
985
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -913,7 +1019,10 @@ def doUpdateLogstashInstance(args, parsed_globals):
|
|
|
913
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
1021
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
1027
|
else:
|
|
919
1028
|
cred = credential.Credential(
|
|
@@ -925,7 +1034,7 @@ def doUpdateLogstashInstance(args, parsed_globals):
|
|
|
925
1034
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
926
1035
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
927
1036
|
)
|
|
928
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1037
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
929
1038
|
if g_param[OptionsDefine.Language]:
|
|
930
1039
|
profile.language = g_param[OptionsDefine.Language]
|
|
931
1040
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -965,7 +1074,10 @@ def doCheckMigrateIndexMetaData(args, parsed_globals):
|
|
|
965
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1076
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1082
|
else:
|
|
971
1083
|
cred = credential.Credential(
|
|
@@ -977,7 +1089,7 @@ def doCheckMigrateIndexMetaData(args, parsed_globals):
|
|
|
977
1089
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
978
1090
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
979
1091
|
)
|
|
980
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1092
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
981
1093
|
if g_param[OptionsDefine.Language]:
|
|
982
1094
|
profile.language = g_param[OptionsDefine.Language]
|
|
983
1095
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1017,7 +1129,10 @@ def doUpdateJdk(args, parsed_globals):
|
|
|
1017
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1131
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1137
|
else:
|
|
1023
1138
|
cred = credential.Credential(
|
|
@@ -1029,7 +1144,7 @@ def doUpdateJdk(args, parsed_globals):
|
|
|
1029
1144
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1030
1145
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1031
1146
|
)
|
|
1032
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1147
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1033
1148
|
if g_param[OptionsDefine.Language]:
|
|
1034
1149
|
profile.language = g_param[OptionsDefine.Language]
|
|
1035
1150
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1069,7 +1184,10 @@ def doCreateServerlessSpaceV2(args, parsed_globals):
|
|
|
1069
1184
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1185
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1186
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1192
|
else:
|
|
1075
1193
|
cred = credential.Credential(
|
|
@@ -1081,7 +1199,7 @@ def doCreateServerlessSpaceV2(args, parsed_globals):
|
|
|
1081
1199
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1082
1200
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1083
1201
|
)
|
|
1084
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1202
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1085
1203
|
if g_param[OptionsDefine.Language]:
|
|
1086
1204
|
profile.language = g_param[OptionsDefine.Language]
|
|
1087
1205
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1121,7 +1239,10 @@ def doDeleteServerlessInstance(args, parsed_globals):
|
|
|
1121
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1241
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1247
|
else:
|
|
1127
1248
|
cred = credential.Credential(
|
|
@@ -1133,7 +1254,7 @@ def doDeleteServerlessInstance(args, parsed_globals):
|
|
|
1133
1254
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1134
1255
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1135
1256
|
)
|
|
1136
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1257
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1137
1258
|
if g_param[OptionsDefine.Language]:
|
|
1138
1259
|
profile.language = g_param[OptionsDefine.Language]
|
|
1139
1260
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1173,7 +1294,10 @@ def doRunRerank(args, parsed_globals):
|
|
|
1173
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1296
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1302
|
else:
|
|
1179
1303
|
cred = credential.Credential(
|
|
@@ -1185,7 +1309,7 @@ def doRunRerank(args, parsed_globals):
|
|
|
1185
1309
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1186
1310
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1187
1311
|
)
|
|
1188
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1312
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1189
1313
|
if g_param[OptionsDefine.Language]:
|
|
1190
1314
|
profile.language = g_param[OptionsDefine.Language]
|
|
1191
1315
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1225,7 +1349,10 @@ def doDescribeClusterSnapshot(args, parsed_globals):
|
|
|
1225
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1351
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1357
|
else:
|
|
1231
1358
|
cred = credential.Credential(
|
|
@@ -1237,7 +1364,7 @@ def doDescribeClusterSnapshot(args, parsed_globals):
|
|
|
1237
1364
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1238
1365
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1239
1366
|
)
|
|
1240
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1367
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1241
1368
|
if g_param[OptionsDefine.Language]:
|
|
1242
1369
|
profile.language = g_param[OptionsDefine.Language]
|
|
1243
1370
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1277,7 +1404,10 @@ def doCreateLogstashInstance(args, parsed_globals):
|
|
|
1277
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1406
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1412
|
else:
|
|
1283
1413
|
cred = credential.Credential(
|
|
@@ -1289,7 +1419,7 @@ def doCreateLogstashInstance(args, parsed_globals):
|
|
|
1289
1419
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1290
1420
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1291
1421
|
)
|
|
1292
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1422
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1293
1423
|
if g_param[OptionsDefine.Language]:
|
|
1294
1424
|
profile.language = g_param[OptionsDefine.Language]
|
|
1295
1425
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1329,7 +1459,10 @@ def doRestartInstance(args, parsed_globals):
|
|
|
1329
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1461
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1467
|
else:
|
|
1335
1468
|
cred = credential.Credential(
|
|
@@ -1341,7 +1474,7 @@ def doRestartInstance(args, parsed_globals):
|
|
|
1341
1474
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1342
1475
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1343
1476
|
)
|
|
1344
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1477
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1345
1478
|
if g_param[OptionsDefine.Language]:
|
|
1346
1479
|
profile.language = g_param[OptionsDefine.Language]
|
|
1347
1480
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1371,6 +1504,61 @@ def doRestartInstance(args, parsed_globals):
|
|
|
1371
1504
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1372
1505
|
|
|
1373
1506
|
|
|
1507
|
+
def doGetIpTraceStatus(args, parsed_globals):
|
|
1508
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1509
|
+
|
|
1510
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1511
|
+
cred = credential.CVMRoleCredential()
|
|
1512
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1513
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1514
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1515
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1516
|
+
)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1521
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1522
|
+
else:
|
|
1523
|
+
cred = credential.Credential(
|
|
1524
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1525
|
+
)
|
|
1526
|
+
http_profile = HttpProfile(
|
|
1527
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1528
|
+
reqMethod="POST",
|
|
1529
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1530
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1531
|
+
)
|
|
1532
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1533
|
+
if g_param[OptionsDefine.Language]:
|
|
1534
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1535
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1536
|
+
client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1537
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1538
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1539
|
+
model = models.GetIpTraceStatusRequest()
|
|
1540
|
+
model.from_json_string(json.dumps(args))
|
|
1541
|
+
start_time = time.time()
|
|
1542
|
+
while True:
|
|
1543
|
+
rsp = client.GetIpTraceStatus(model)
|
|
1544
|
+
result = rsp.to_json_string()
|
|
1545
|
+
try:
|
|
1546
|
+
json_obj = json.loads(result)
|
|
1547
|
+
except TypeError as e:
|
|
1548
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1549
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1550
|
+
break
|
|
1551
|
+
cur_time = time.time()
|
|
1552
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1553
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1554
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1555
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1556
|
+
else:
|
|
1557
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1558
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1559
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1560
|
+
|
|
1561
|
+
|
|
1374
1562
|
def doUpdateInstance(args, parsed_globals):
|
|
1375
1563
|
g_param = parse_global_arg(parsed_globals)
|
|
1376
1564
|
|
|
@@ -1381,7 +1569,10 @@ def doUpdateInstance(args, parsed_globals):
|
|
|
1381
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1571
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1577
|
else:
|
|
1387
1578
|
cred = credential.Credential(
|
|
@@ -1393,7 +1584,7 @@ def doUpdateInstance(args, parsed_globals):
|
|
|
1393
1584
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1394
1585
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1395
1586
|
)
|
|
1396
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1587
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1397
1588
|
if g_param[OptionsDefine.Language]:
|
|
1398
1589
|
profile.language = g_param[OptionsDefine.Language]
|
|
1399
1590
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1433,7 +1624,10 @@ def doDescribeInstanceLogs(args, parsed_globals):
|
|
|
1433
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1626
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1632
|
else:
|
|
1439
1633
|
cred = credential.Credential(
|
|
@@ -1445,7 +1639,7 @@ def doDescribeInstanceLogs(args, parsed_globals):
|
|
|
1445
1639
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1446
1640
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1447
1641
|
)
|
|
1448
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1642
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1449
1643
|
if g_param[OptionsDefine.Language]:
|
|
1450
1644
|
profile.language = g_param[OptionsDefine.Language]
|
|
1451
1645
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1485,7 +1679,10 @@ def doRestartKibana(args, parsed_globals):
|
|
|
1485
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1681
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1687
|
else:
|
|
1491
1688
|
cred = credential.Credential(
|
|
@@ -1497,7 +1694,7 @@ def doRestartKibana(args, parsed_globals):
|
|
|
1497
1694
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1498
1695
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1499
1696
|
)
|
|
1500
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1697
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1501
1698
|
if g_param[OptionsDefine.Language]:
|
|
1502
1699
|
profile.language = g_param[OptionsDefine.Language]
|
|
1503
1700
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1537,7 +1734,10 @@ def doUpdateLogstashPipelineDesc(args, parsed_globals):
|
|
|
1537
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1736
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1742
|
else:
|
|
1543
1743
|
cred = credential.Credential(
|
|
@@ -1549,7 +1749,7 @@ def doUpdateLogstashPipelineDesc(args, parsed_globals):
|
|
|
1549
1749
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1550
1750
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1551
1751
|
)
|
|
1552
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1752
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1553
1753
|
if g_param[OptionsDefine.Language]:
|
|
1554
1754
|
profile.language = g_param[OptionsDefine.Language]
|
|
1555
1755
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1589,7 +1789,10 @@ def doCreateServerlessInstance(args, parsed_globals):
|
|
|
1589
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1791
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1797
|
else:
|
|
1595
1798
|
cred = credential.Credential(
|
|
@@ -1601,7 +1804,7 @@ def doCreateServerlessInstance(args, parsed_globals):
|
|
|
1601
1804
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1602
1805
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1603
1806
|
)
|
|
1604
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1807
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1605
1808
|
if g_param[OptionsDefine.Language]:
|
|
1606
1809
|
profile.language = g_param[OptionsDefine.Language]
|
|
1607
1810
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1641,7 +1844,10 @@ def doDescribeViews(args, parsed_globals):
|
|
|
1641
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1846
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1852
|
else:
|
|
1647
1853
|
cred = credential.Credential(
|
|
@@ -1653,7 +1859,7 @@ def doDescribeViews(args, parsed_globals):
|
|
|
1653
1859
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1654
1860
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1655
1861
|
)
|
|
1656
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1862
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1657
1863
|
if g_param[OptionsDefine.Language]:
|
|
1658
1864
|
profile.language = g_param[OptionsDefine.Language]
|
|
1659
1865
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1693,7 +1899,10 @@ def doUpdateRequestTargetNodeTypes(args, parsed_globals):
|
|
|
1693
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1901
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1907
|
else:
|
|
1699
1908
|
cred = credential.Credential(
|
|
@@ -1705,7 +1914,7 @@ def doUpdateRequestTargetNodeTypes(args, parsed_globals):
|
|
|
1705
1914
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1706
1915
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1707
1916
|
)
|
|
1708
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1917
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1709
1918
|
if g_param[OptionsDefine.Language]:
|
|
1710
1919
|
profile.language = g_param[OptionsDefine.Language]
|
|
1711
1920
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1745,7 +1954,10 @@ def doChunkDocumentAsync(args, parsed_globals):
|
|
|
1745
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1956
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1962
|
else:
|
|
1751
1963
|
cred = credential.Credential(
|
|
@@ -1757,7 +1969,7 @@ def doChunkDocumentAsync(args, parsed_globals):
|
|
|
1757
1969
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1758
1970
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1759
1971
|
)
|
|
1760
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1972
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1761
1973
|
if g_param[OptionsDefine.Language]:
|
|
1762
1974
|
profile.language = g_param[OptionsDefine.Language]
|
|
1763
1975
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1797,7 +2009,10 @@ def doDescribeSpaceKibanaTools(args, parsed_globals):
|
|
|
1797
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
2011
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
2017
|
else:
|
|
1803
2018
|
cred = credential.Credential(
|
|
@@ -1809,7 +2024,7 @@ def doDescribeSpaceKibanaTools(args, parsed_globals):
|
|
|
1809
2024
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1810
2025
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1811
2026
|
)
|
|
1812
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2027
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1813
2028
|
if g_param[OptionsDefine.Language]:
|
|
1814
2029
|
profile.language = g_param[OptionsDefine.Language]
|
|
1815
2030
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1849,7 +2064,10 @@ def doDescribeLogstashPipelines(args, parsed_globals):
|
|
|
1849
2064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
2065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
2066
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
2071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
2072
|
else:
|
|
1855
2073
|
cred = credential.Credential(
|
|
@@ -1861,7 +2079,7 @@ def doDescribeLogstashPipelines(args, parsed_globals):
|
|
|
1861
2079
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1862
2080
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1863
2081
|
)
|
|
1864
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1865
2083
|
if g_param[OptionsDefine.Language]:
|
|
1866
2084
|
profile.language = g_param[OptionsDefine.Language]
|
|
1867
2085
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1901,7 +2119,10 @@ def doGetDocumentChunkResult(args, parsed_globals):
|
|
|
1901
2119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2121
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2127
|
else:
|
|
1907
2128
|
cred = credential.Credential(
|
|
@@ -1913,7 +2134,7 @@ def doGetDocumentChunkResult(args, parsed_globals):
|
|
|
1913
2134
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1914
2135
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1915
2136
|
)
|
|
1916
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2137
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1917
2138
|
if g_param[OptionsDefine.Language]:
|
|
1918
2139
|
profile.language = g_param[OptionsDefine.Language]
|
|
1919
2140
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1953,7 +2174,10 @@ def doDescribeUserCosSnapshotList(args, parsed_globals):
|
|
|
1953
2174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1954
2175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1955
2176
|
)
|
|
1956
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1957
2181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1958
2182
|
else:
|
|
1959
2183
|
cred = credential.Credential(
|
|
@@ -1965,7 +2189,7 @@ def doDescribeUserCosSnapshotList(args, parsed_globals):
|
|
|
1965
2189
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1966
2190
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1967
2191
|
)
|
|
1968
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2192
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1969
2193
|
if g_param[OptionsDefine.Language]:
|
|
1970
2194
|
profile.language = g_param[OptionsDefine.Language]
|
|
1971
2195
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2005,7 +2229,10 @@ def doModifyEsVipSecurityGroup(args, parsed_globals):
|
|
|
2005
2229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2006
2230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2007
2231
|
)
|
|
2008
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2009
2236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2010
2237
|
else:
|
|
2011
2238
|
cred = credential.Credential(
|
|
@@ -2017,7 +2244,7 @@ def doModifyEsVipSecurityGroup(args, parsed_globals):
|
|
|
2017
2244
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2018
2245
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2019
2246
|
)
|
|
2020
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2247
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2021
2248
|
if g_param[OptionsDefine.Language]:
|
|
2022
2249
|
profile.language = g_param[OptionsDefine.Language]
|
|
2023
2250
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2057,7 +2284,10 @@ def doCreateInstance(args, parsed_globals):
|
|
|
2057
2284
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2058
2285
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2059
2286
|
)
|
|
2060
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2287
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2289
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2290
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2061
2291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2062
2292
|
else:
|
|
2063
2293
|
cred = credential.Credential(
|
|
@@ -2069,7 +2299,7 @@ def doCreateInstance(args, parsed_globals):
|
|
|
2069
2299
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2070
2300
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2071
2301
|
)
|
|
2072
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2302
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2073
2303
|
if g_param[OptionsDefine.Language]:
|
|
2074
2304
|
profile.language = g_param[OptionsDefine.Language]
|
|
2075
2305
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2109,7 +2339,10 @@ def doUpdateServerlessInstance(args, parsed_globals):
|
|
|
2109
2339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2110
2340
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2111
2341
|
)
|
|
2112
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2344
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2345
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2113
2346
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2114
2347
|
else:
|
|
2115
2348
|
cred = credential.Credential(
|
|
@@ -2121,7 +2354,7 @@ def doUpdateServerlessInstance(args, parsed_globals):
|
|
|
2121
2354
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2122
2355
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2123
2356
|
)
|
|
2124
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2357
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2125
2358
|
if g_param[OptionsDefine.Language]:
|
|
2126
2359
|
profile.language = g_param[OptionsDefine.Language]
|
|
2127
2360
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2151,7 +2384,7 @@ def doUpdateServerlessInstance(args, parsed_globals):
|
|
|
2151
2384
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2152
2385
|
|
|
2153
2386
|
|
|
2154
|
-
def
|
|
2387
|
+
def doQueryIpTraceLog(args, parsed_globals):
|
|
2155
2388
|
g_param = parse_global_arg(parsed_globals)
|
|
2156
2389
|
|
|
2157
2390
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2161,7 +2394,10 @@ def doRestartLogstashInstance(args, parsed_globals):
|
|
|
2161
2394
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2162
2395
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2163
2396
|
)
|
|
2164
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2397
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2399
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2400
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2165
2401
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2166
2402
|
else:
|
|
2167
2403
|
cred = credential.Credential(
|
|
@@ -2173,18 +2409,18 @@ def doRestartLogstashInstance(args, parsed_globals):
|
|
|
2173
2409
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2174
2410
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2175
2411
|
)
|
|
2176
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2412
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2177
2413
|
if g_param[OptionsDefine.Language]:
|
|
2178
2414
|
profile.language = g_param[OptionsDefine.Language]
|
|
2179
2415
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2180
2416
|
client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2181
2417
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2182
2418
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2183
|
-
model = models.
|
|
2419
|
+
model = models.QueryIpTraceLogRequest()
|
|
2184
2420
|
model.from_json_string(json.dumps(args))
|
|
2185
2421
|
start_time = time.time()
|
|
2186
2422
|
while True:
|
|
2187
|
-
rsp = client.
|
|
2423
|
+
rsp = client.QueryIpTraceLog(model)
|
|
2188
2424
|
result = rsp.to_json_string()
|
|
2189
2425
|
try:
|
|
2190
2426
|
json_obj = json.loads(result)
|
|
@@ -2213,7 +2449,10 @@ def doGetTextEmbedding(args, parsed_globals):
|
|
|
2213
2449
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2214
2450
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2215
2451
|
)
|
|
2216
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2452
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2454
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2455
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2217
2456
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2218
2457
|
else:
|
|
2219
2458
|
cred = credential.Credential(
|
|
@@ -2225,7 +2464,7 @@ def doGetTextEmbedding(args, parsed_globals):
|
|
|
2225
2464
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2226
2465
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2227
2466
|
)
|
|
2228
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2467
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2229
2468
|
if g_param[OptionsDefine.Language]:
|
|
2230
2469
|
profile.language = g_param[OptionsDefine.Language]
|
|
2231
2470
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2265,7 +2504,10 @@ def doDescribeDiagnose(args, parsed_globals):
|
|
|
2265
2504
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2266
2505
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2267
2506
|
)
|
|
2268
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2507
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2509
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2510
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2269
2511
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2270
2512
|
else:
|
|
2271
2513
|
cred = credential.Credential(
|
|
@@ -2277,7 +2519,7 @@ def doDescribeDiagnose(args, parsed_globals):
|
|
|
2277
2519
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2278
2520
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2279
2521
|
)
|
|
2280
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2522
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2281
2523
|
if g_param[OptionsDefine.Language]:
|
|
2282
2524
|
profile.language = g_param[OptionsDefine.Language]
|
|
2283
2525
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2317,7 +2559,10 @@ def doParseDocument(args, parsed_globals):
|
|
|
2317
2559
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2318
2560
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2319
2561
|
)
|
|
2320
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2562
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2564
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2565
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2321
2566
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2322
2567
|
else:
|
|
2323
2568
|
cred = credential.Credential(
|
|
@@ -2329,7 +2574,7 @@ def doParseDocument(args, parsed_globals):
|
|
|
2329
2574
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2330
2575
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2331
2576
|
)
|
|
2332
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2577
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2333
2578
|
if g_param[OptionsDefine.Language]:
|
|
2334
2579
|
profile.language = g_param[OptionsDefine.Language]
|
|
2335
2580
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2369,7 +2614,10 @@ def doUpdateDictionaries(args, parsed_globals):
|
|
|
2369
2614
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2370
2615
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2371
2616
|
)
|
|
2372
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2617
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2619
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2620
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2373
2621
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2374
2622
|
else:
|
|
2375
2623
|
cred = credential.Credential(
|
|
@@ -2381,7 +2629,7 @@ def doUpdateDictionaries(args, parsed_globals):
|
|
|
2381
2629
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2382
2630
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2383
2631
|
)
|
|
2384
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2632
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2385
2633
|
if g_param[OptionsDefine.Language]:
|
|
2386
2634
|
profile.language = g_param[OptionsDefine.Language]
|
|
2387
2635
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2421,7 +2669,10 @@ def doUpdateIndex(args, parsed_globals):
|
|
|
2421
2669
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2422
2670
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2423
2671
|
)
|
|
2424
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2672
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2674
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2675
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2425
2676
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2426
2677
|
else:
|
|
2427
2678
|
cred = credential.Credential(
|
|
@@ -2433,7 +2684,7 @@ def doUpdateIndex(args, parsed_globals):
|
|
|
2433
2684
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2434
2685
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2435
2686
|
)
|
|
2436
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2687
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2437
2688
|
if g_param[OptionsDefine.Language]:
|
|
2438
2689
|
profile.language = g_param[OptionsDefine.Language]
|
|
2439
2690
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2473,7 +2724,10 @@ def doDescribeLogstashInstanceOperations(args, parsed_globals):
|
|
|
2473
2724
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2474
2725
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2475
2726
|
)
|
|
2476
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2727
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2729
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2730
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2477
2731
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2478
2732
|
else:
|
|
2479
2733
|
cred = credential.Credential(
|
|
@@ -2485,7 +2739,7 @@ def doDescribeLogstashInstanceOperations(args, parsed_globals):
|
|
|
2485
2739
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2486
2740
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2487
2741
|
)
|
|
2488
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2742
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2489
2743
|
if g_param[OptionsDefine.Language]:
|
|
2490
2744
|
profile.language = g_param[OptionsDefine.Language]
|
|
2491
2745
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2525,7 +2779,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
2525
2779
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2526
2780
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2527
2781
|
)
|
|
2528
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2782
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2784
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2785
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2529
2786
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2530
2787
|
else:
|
|
2531
2788
|
cred = credential.Credential(
|
|
@@ -2537,7 +2794,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
2537
2794
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2538
2795
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2539
2796
|
)
|
|
2540
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2797
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2541
2798
|
if g_param[OptionsDefine.Language]:
|
|
2542
2799
|
profile.language = g_param[OptionsDefine.Language]
|
|
2543
2800
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2577,7 +2834,10 @@ def doUpdateServerlessSpace(args, parsed_globals):
|
|
|
2577
2834
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2578
2835
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2579
2836
|
)
|
|
2580
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2837
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2839
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2840
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2581
2841
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2582
2842
|
else:
|
|
2583
2843
|
cred = credential.Credential(
|
|
@@ -2589,7 +2849,7 @@ def doUpdateServerlessSpace(args, parsed_globals):
|
|
|
2589
2849
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2590
2850
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2591
2851
|
)
|
|
2592
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2852
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2593
2853
|
if g_param[OptionsDefine.Language]:
|
|
2594
2854
|
profile.language = g_param[OptionsDefine.Language]
|
|
2595
2855
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2629,7 +2889,10 @@ def doStartLogstashPipelines(args, parsed_globals):
|
|
|
2629
2889
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2630
2890
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2631
2891
|
)
|
|
2632
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2892
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2894
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2895
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2633
2896
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2634
2897
|
else:
|
|
2635
2898
|
cred = credential.Credential(
|
|
@@ -2641,7 +2904,7 @@ def doStartLogstashPipelines(args, parsed_globals):
|
|
|
2641
2904
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2642
2905
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2643
2906
|
)
|
|
2644
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2907
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2645
2908
|
if g_param[OptionsDefine.Language]:
|
|
2646
2909
|
profile.language = g_param[OptionsDefine.Language]
|
|
2647
2910
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2681,7 +2944,10 @@ def doUpgradeInstance(args, parsed_globals):
|
|
|
2681
2944
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2682
2945
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2683
2946
|
)
|
|
2684
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2947
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2949
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2950
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2685
2951
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2686
2952
|
else:
|
|
2687
2953
|
cred = credential.Credential(
|
|
@@ -2693,7 +2959,7 @@ def doUpgradeInstance(args, parsed_globals):
|
|
|
2693
2959
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2694
2960
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2695
2961
|
)
|
|
2696
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2962
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2697
2963
|
if g_param[OptionsDefine.Language]:
|
|
2698
2964
|
profile.language = g_param[OptionsDefine.Language]
|
|
2699
2965
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2733,7 +2999,10 @@ def doDeleteServerlessSpaceUser(args, parsed_globals):
|
|
|
2733
2999
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2734
3000
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2735
3001
|
)
|
|
2736
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3002
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3004
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3005
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2737
3006
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2738
3007
|
else:
|
|
2739
3008
|
cred = credential.Credential(
|
|
@@ -2745,7 +3014,7 @@ def doDeleteServerlessSpaceUser(args, parsed_globals):
|
|
|
2745
3014
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2746
3015
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2747
3016
|
)
|
|
2748
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3017
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2749
3018
|
if g_param[OptionsDefine.Language]:
|
|
2750
3019
|
profile.language = g_param[OptionsDefine.Language]
|
|
2751
3020
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2785,7 +3054,10 @@ def doDeleteClusterSnapshot(args, parsed_globals):
|
|
|
2785
3054
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2786
3055
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2787
3056
|
)
|
|
2788
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3057
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3059
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3060
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2789
3061
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2790
3062
|
else:
|
|
2791
3063
|
cred = credential.Credential(
|
|
@@ -2797,7 +3069,7 @@ def doDeleteClusterSnapshot(args, parsed_globals):
|
|
|
2797
3069
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2798
3070
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2799
3071
|
)
|
|
2800
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3072
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2801
3073
|
if g_param[OptionsDefine.Language]:
|
|
2802
3074
|
profile.language = g_param[OptionsDefine.Language]
|
|
2803
3075
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2837,7 +3109,10 @@ def doDescribeLogstashInstanceLogs(args, parsed_globals):
|
|
|
2837
3109
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2838
3110
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2839
3111
|
)
|
|
2840
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3112
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3114
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3115
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
3116
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
3117
|
else:
|
|
2843
3118
|
cred = credential.Credential(
|
|
@@ -2849,7 +3124,7 @@ def doDescribeLogstashInstanceLogs(args, parsed_globals):
|
|
|
2849
3124
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2850
3125
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2851
3126
|
)
|
|
2852
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3127
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2853
3128
|
if g_param[OptionsDefine.Language]:
|
|
2854
3129
|
profile.language = g_param[OptionsDefine.Language]
|
|
2855
3130
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2889,7 +3164,10 @@ def doDescribeServerlessMetrics(args, parsed_globals):
|
|
|
2889
3164
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2890
3165
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2891
3166
|
)
|
|
2892
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3167
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3169
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3170
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2893
3171
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2894
3172
|
else:
|
|
2895
3173
|
cred = credential.Credential(
|
|
@@ -2901,7 +3179,7 @@ def doDescribeServerlessMetrics(args, parsed_globals):
|
|
|
2901
3179
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2902
3180
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2903
3181
|
)
|
|
2904
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3182
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2905
3183
|
if g_param[OptionsDefine.Language]:
|
|
2906
3184
|
profile.language = g_param[OptionsDefine.Language]
|
|
2907
3185
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2941,7 +3219,10 @@ def doRestartNodes(args, parsed_globals):
|
|
|
2941
3219
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2942
3220
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2943
3221
|
)
|
|
2944
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3222
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3224
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3225
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2945
3226
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2946
3227
|
else:
|
|
2947
3228
|
cred = credential.Credential(
|
|
@@ -2953,7 +3234,7 @@ def doRestartNodes(args, parsed_globals):
|
|
|
2953
3234
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2954
3235
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2955
3236
|
)
|
|
2956
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3237
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2957
3238
|
if g_param[OptionsDefine.Language]:
|
|
2958
3239
|
profile.language = g_param[OptionsDefine.Language]
|
|
2959
3240
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2993,7 +3274,10 @@ def doParseDocumentAsync(args, parsed_globals):
|
|
|
2993
3274
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2994
3275
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2995
3276
|
)
|
|
2996
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3277
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3279
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3280
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2997
3281
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2998
3282
|
else:
|
|
2999
3283
|
cred = credential.Credential(
|
|
@@ -3005,7 +3289,7 @@ def doParseDocumentAsync(args, parsed_globals):
|
|
|
3005
3289
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3006
3290
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3007
3291
|
)
|
|
3008
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3292
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3009
3293
|
if g_param[OptionsDefine.Language]:
|
|
3010
3294
|
profile.language = g_param[OptionsDefine.Language]
|
|
3011
3295
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3045,7 +3329,10 @@ def doDescribeServerlessSpaceUser(args, parsed_globals):
|
|
|
3045
3329
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3046
3330
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3047
3331
|
)
|
|
3048
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3332
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3334
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3335
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3049
3336
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3050
3337
|
else:
|
|
3051
3338
|
cred = credential.Credential(
|
|
@@ -3057,7 +3344,7 @@ def doDescribeServerlessSpaceUser(args, parsed_globals):
|
|
|
3057
3344
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3058
3345
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3059
3346
|
)
|
|
3060
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3347
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3061
3348
|
if g_param[OptionsDefine.Language]:
|
|
3062
3349
|
profile.language = g_param[OptionsDefine.Language]
|
|
3063
3350
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3087,6 +3374,61 @@ def doDescribeServerlessSpaceUser(args, parsed_globals):
|
|
|
3087
3374
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3088
3375
|
|
|
3089
3376
|
|
|
3377
|
+
def doRestartLogstashInstance(args, parsed_globals):
|
|
3378
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3379
|
+
|
|
3380
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3381
|
+
cred = credential.CVMRoleCredential()
|
|
3382
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3383
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3384
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3385
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3386
|
+
)
|
|
3387
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3389
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3390
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3391
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3392
|
+
else:
|
|
3393
|
+
cred = credential.Credential(
|
|
3394
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3395
|
+
)
|
|
3396
|
+
http_profile = HttpProfile(
|
|
3397
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3398
|
+
reqMethod="POST",
|
|
3399
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3400
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3401
|
+
)
|
|
3402
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3403
|
+
if g_param[OptionsDefine.Language]:
|
|
3404
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3405
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3406
|
+
client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3407
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3408
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3409
|
+
model = models.RestartLogstashInstanceRequest()
|
|
3410
|
+
model.from_json_string(json.dumps(args))
|
|
3411
|
+
start_time = time.time()
|
|
3412
|
+
while True:
|
|
3413
|
+
rsp = client.RestartLogstashInstance(model)
|
|
3414
|
+
result = rsp.to_json_string()
|
|
3415
|
+
try:
|
|
3416
|
+
json_obj = json.loads(result)
|
|
3417
|
+
except TypeError as e:
|
|
3418
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3419
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3420
|
+
break
|
|
3421
|
+
cur_time = time.time()
|
|
3422
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3423
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3424
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3425
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3426
|
+
else:
|
|
3427
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3428
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3429
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3430
|
+
|
|
3431
|
+
|
|
3090
3432
|
def doDeleteIndex(args, parsed_globals):
|
|
3091
3433
|
g_param = parse_global_arg(parsed_globals)
|
|
3092
3434
|
|
|
@@ -3097,7 +3439,10 @@ def doDeleteIndex(args, parsed_globals):
|
|
|
3097
3439
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3098
3440
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3099
3441
|
)
|
|
3100
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3442
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3444
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3445
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3101
3446
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3102
3447
|
else:
|
|
3103
3448
|
cred = credential.Credential(
|
|
@@ -3109,7 +3454,7 @@ def doDeleteIndex(args, parsed_globals):
|
|
|
3109
3454
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3110
3455
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3111
3456
|
)
|
|
3112
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3457
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3113
3458
|
if g_param[OptionsDefine.Language]:
|
|
3114
3459
|
profile.language = g_param[OptionsDefine.Language]
|
|
3115
3460
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3149,7 +3494,10 @@ def doSaveAndDeployLogstashPipeline(args, parsed_globals):
|
|
|
3149
3494
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3150
3495
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3151
3496
|
)
|
|
3152
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3497
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3499
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3500
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3153
3501
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3154
3502
|
else:
|
|
3155
3503
|
cred = credential.Credential(
|
|
@@ -3161,7 +3509,7 @@ def doSaveAndDeployLogstashPipeline(args, parsed_globals):
|
|
|
3161
3509
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3162
3510
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3163
3511
|
)
|
|
3164
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3512
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3165
3513
|
if g_param[OptionsDefine.Language]:
|
|
3166
3514
|
profile.language = g_param[OptionsDefine.Language]
|
|
3167
3515
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3201,7 +3549,10 @@ def doDeleteLogstashPipelines(args, parsed_globals):
|
|
|
3201
3549
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3202
3550
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3203
3551
|
)
|
|
3204
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3552
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3554
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3555
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3205
3556
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3206
3557
|
else:
|
|
3207
3558
|
cred = credential.Credential(
|
|
@@ -3213,7 +3564,7 @@ def doDeleteLogstashPipelines(args, parsed_globals):
|
|
|
3213
3564
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3214
3565
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3215
3566
|
)
|
|
3216
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3567
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3217
3568
|
if g_param[OptionsDefine.Language]:
|
|
3218
3569
|
profile.language = g_param[OptionsDefine.Language]
|
|
3219
3570
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3243,7 +3594,7 @@ def doDeleteLogstashPipelines(args, parsed_globals):
|
|
|
3243
3594
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3244
3595
|
|
|
3245
3596
|
|
|
3246
|
-
def
|
|
3597
|
+
def doUpdateIpTraceStatus(args, parsed_globals):
|
|
3247
3598
|
g_param = parse_global_arg(parsed_globals)
|
|
3248
3599
|
|
|
3249
3600
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3253,7 +3604,10 @@ def doExportIpTraceLog(args, parsed_globals):
|
|
|
3253
3604
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3254
3605
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3255
3606
|
)
|
|
3256
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3607
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3609
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3610
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3257
3611
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3258
3612
|
else:
|
|
3259
3613
|
cred = credential.Credential(
|
|
@@ -3265,18 +3619,18 @@ def doExportIpTraceLog(args, parsed_globals):
|
|
|
3265
3619
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3266
3620
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3267
3621
|
)
|
|
3268
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3622
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3269
3623
|
if g_param[OptionsDefine.Language]:
|
|
3270
3624
|
profile.language = g_param[OptionsDefine.Language]
|
|
3271
3625
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3272
3626
|
client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3273
3627
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3274
3628
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3275
|
-
model = models.
|
|
3629
|
+
model = models.UpdateIpTraceStatusRequest()
|
|
3276
3630
|
model.from_json_string(json.dumps(args))
|
|
3277
3631
|
start_time = time.time()
|
|
3278
3632
|
while True:
|
|
3279
|
-
rsp = client.
|
|
3633
|
+
rsp = client.UpdateIpTraceStatus(model)
|
|
3280
3634
|
result = rsp.to_json_string()
|
|
3281
3635
|
try:
|
|
3282
3636
|
json_obj = json.loads(result)
|
|
@@ -3305,7 +3659,10 @@ def doUpgradeLicense(args, parsed_globals):
|
|
|
3305
3659
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3306
3660
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3307
3661
|
)
|
|
3308
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3662
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3664
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3665
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3309
3666
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3310
3667
|
else:
|
|
3311
3668
|
cred = credential.Credential(
|
|
@@ -3317,7 +3674,7 @@ def doUpgradeLicense(args, parsed_globals):
|
|
|
3317
3674
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3318
3675
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3319
3676
|
)
|
|
3320
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3677
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3321
3678
|
if g_param[OptionsDefine.Language]:
|
|
3322
3679
|
profile.language = g_param[OptionsDefine.Language]
|
|
3323
3680
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3357,7 +3714,10 @@ def doDescribeInstancePluginList(args, parsed_globals):
|
|
|
3357
3714
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3358
3715
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3359
3716
|
)
|
|
3360
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3717
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3719
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3720
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3361
3721
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3362
3722
|
else:
|
|
3363
3723
|
cred = credential.Credential(
|
|
@@ -3369,7 +3729,7 @@ def doDescribeInstancePluginList(args, parsed_globals):
|
|
|
3369
3729
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3370
3730
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3371
3731
|
)
|
|
3372
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3732
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3373
3733
|
if g_param[OptionsDefine.Language]:
|
|
3374
3734
|
profile.language = g_param[OptionsDefine.Language]
|
|
3375
3735
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3409,7 +3769,10 @@ def doDescribeServerlessInstances(args, parsed_globals):
|
|
|
3409
3769
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3410
3770
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3411
3771
|
)
|
|
3412
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3772
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3774
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3775
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3413
3776
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3414
3777
|
else:
|
|
3415
3778
|
cred = credential.Credential(
|
|
@@ -3421,7 +3784,7 @@ def doDescribeServerlessInstances(args, parsed_globals):
|
|
|
3421
3784
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3422
3785
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3423
3786
|
)
|
|
3424
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3787
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3425
3788
|
if g_param[OptionsDefine.Language]:
|
|
3426
3789
|
profile.language = g_param[OptionsDefine.Language]
|
|
3427
3790
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3461,7 +3824,10 @@ def doDescribeIndexMeta(args, parsed_globals):
|
|
|
3461
3824
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3462
3825
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3463
3826
|
)
|
|
3464
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3827
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3829
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3830
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3465
3831
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3466
3832
|
else:
|
|
3467
3833
|
cred = credential.Credential(
|
|
@@ -3473,7 +3839,7 @@ def doDescribeIndexMeta(args, parsed_globals):
|
|
|
3473
3839
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3474
3840
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3475
3841
|
)
|
|
3476
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3842
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3477
3843
|
if g_param[OptionsDefine.Language]:
|
|
3478
3844
|
profile.language = g_param[OptionsDefine.Language]
|
|
3479
3845
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3513,7 +3879,10 @@ def doChatCompletions(args, parsed_globals):
|
|
|
3513
3879
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3514
3880
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3515
3881
|
)
|
|
3516
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3882
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3884
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3885
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3517
3886
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3518
3887
|
else:
|
|
3519
3888
|
cred = credential.Credential(
|
|
@@ -3525,7 +3894,7 @@ def doChatCompletions(args, parsed_globals):
|
|
|
3525
3894
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3526
3895
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3527
3896
|
)
|
|
3528
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3897
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3529
3898
|
if g_param[OptionsDefine.Language]:
|
|
3530
3899
|
profile.language = g_param[OptionsDefine.Language]
|
|
3531
3900
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3565,7 +3934,10 @@ def doChunkDocument(args, parsed_globals):
|
|
|
3565
3934
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3566
3935
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3567
3936
|
)
|
|
3568
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3937
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3939
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3940
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3569
3941
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3570
3942
|
else:
|
|
3571
3943
|
cred = credential.Credential(
|
|
@@ -3577,7 +3949,7 @@ def doChunkDocument(args, parsed_globals):
|
|
|
3577
3949
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3578
3950
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3579
3951
|
)
|
|
3580
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3952
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3581
3953
|
if g_param[OptionsDefine.Language]:
|
|
3582
3954
|
profile.language = g_param[OptionsDefine.Language]
|
|
3583
3955
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3617,7 +3989,10 @@ def doGetMultiModalEmbedding(args, parsed_globals):
|
|
|
3617
3989
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3618
3990
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3619
3991
|
)
|
|
3620
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3992
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3994
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3995
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3621
3996
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3622
3997
|
else:
|
|
3623
3998
|
cred = credential.Credential(
|
|
@@ -3629,7 +4004,7 @@ def doGetMultiModalEmbedding(args, parsed_globals):
|
|
|
3629
4004
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3630
4005
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3631
4006
|
)
|
|
3632
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4007
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3633
4008
|
if g_param[OptionsDefine.Language]:
|
|
3634
4009
|
profile.language = g_param[OptionsDefine.Language]
|
|
3635
4010
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3669,7 +4044,10 @@ def doInquirePriceRenewInstance(args, parsed_globals):
|
|
|
3669
4044
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3670
4045
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3671
4046
|
)
|
|
3672
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4047
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4049
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4050
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3673
4051
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3674
4052
|
else:
|
|
3675
4053
|
cred = credential.Credential(
|
|
@@ -3681,7 +4059,7 @@ def doInquirePriceRenewInstance(args, parsed_globals):
|
|
|
3681
4059
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3682
4060
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3683
4061
|
)
|
|
3684
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4062
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3685
4063
|
if g_param[OptionsDefine.Language]:
|
|
3686
4064
|
profile.language = g_param[OptionsDefine.Language]
|
|
3687
4065
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3721,7 +4099,10 @@ def doCreateClusterSnapshot(args, parsed_globals):
|
|
|
3721
4099
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3722
4100
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3723
4101
|
)
|
|
3724
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3725
4106
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3726
4107
|
else:
|
|
3727
4108
|
cred = credential.Credential(
|
|
@@ -3733,7 +4114,7 @@ def doCreateClusterSnapshot(args, parsed_globals):
|
|
|
3733
4114
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3734
4115
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3735
4116
|
)
|
|
3736
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4117
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3737
4118
|
if g_param[OptionsDefine.Language]:
|
|
3738
4119
|
profile.language = g_param[OptionsDefine.Language]
|
|
3739
4120
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3782,6 +4163,7 @@ ACTION_MAP = {
|
|
|
3782
4163
|
"GetRequestTargetNodeTypes": doGetRequestTargetNodeTypes,
|
|
3783
4164
|
"StopLogstashPipelines": doStopLogstashPipelines,
|
|
3784
4165
|
"DescribeServerlessSpaces": doDescribeServerlessSpaces,
|
|
4166
|
+
"ExportIpTraceLog": doExportIpTraceLog,
|
|
3785
4167
|
"InstallInstanceModel": doInstallInstanceModel,
|
|
3786
4168
|
"DescribeIndexList": doDescribeIndexList,
|
|
3787
4169
|
"DescribeInstanceOperations": doDescribeInstanceOperations,
|
|
@@ -3802,6 +4184,7 @@ ACTION_MAP = {
|
|
|
3802
4184
|
"DescribeClusterSnapshot": doDescribeClusterSnapshot,
|
|
3803
4185
|
"CreateLogstashInstance": doCreateLogstashInstance,
|
|
3804
4186
|
"RestartInstance": doRestartInstance,
|
|
4187
|
+
"GetIpTraceStatus": doGetIpTraceStatus,
|
|
3805
4188
|
"UpdateInstance": doUpdateInstance,
|
|
3806
4189
|
"DescribeInstanceLogs": doDescribeInstanceLogs,
|
|
3807
4190
|
"RestartKibana": doRestartKibana,
|
|
@@ -3817,7 +4200,7 @@ ACTION_MAP = {
|
|
|
3817
4200
|
"ModifyEsVipSecurityGroup": doModifyEsVipSecurityGroup,
|
|
3818
4201
|
"CreateInstance": doCreateInstance,
|
|
3819
4202
|
"UpdateServerlessInstance": doUpdateServerlessInstance,
|
|
3820
|
-
"
|
|
4203
|
+
"QueryIpTraceLog": doQueryIpTraceLog,
|
|
3821
4204
|
"GetTextEmbedding": doGetTextEmbedding,
|
|
3822
4205
|
"DescribeDiagnose": doDescribeDiagnose,
|
|
3823
4206
|
"ParseDocument": doParseDocument,
|
|
@@ -3835,10 +4218,11 @@ ACTION_MAP = {
|
|
|
3835
4218
|
"RestartNodes": doRestartNodes,
|
|
3836
4219
|
"ParseDocumentAsync": doParseDocumentAsync,
|
|
3837
4220
|
"DescribeServerlessSpaceUser": doDescribeServerlessSpaceUser,
|
|
4221
|
+
"RestartLogstashInstance": doRestartLogstashInstance,
|
|
3838
4222
|
"DeleteIndex": doDeleteIndex,
|
|
3839
4223
|
"SaveAndDeployLogstashPipeline": doSaveAndDeployLogstashPipeline,
|
|
3840
4224
|
"DeleteLogstashPipelines": doDeleteLogstashPipelines,
|
|
3841
|
-
"
|
|
4225
|
+
"UpdateIpTraceStatus": doUpdateIpTraceStatus,
|
|
3842
4226
|
"UpgradeLicense": doUpgradeLicense,
|
|
3843
4227
|
"DescribeInstancePluginList": doDescribeInstancePluginList,
|
|
3844
4228
|
"DescribeServerlessInstances": doDescribeServerlessInstances,
|