tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -29,7 +29,10 @@ def doDiagnoseInstance(args, parsed_globals):
29
29
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
30
30
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
31
31
  )
32
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
32
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
34
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
35
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
33
36
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
34
37
  else:
35
38
  cred = credential.Credential(
@@ -41,7 +44,7 @@ def doDiagnoseInstance(args, parsed_globals):
41
44
  endpoint=g_param[OptionsDefine.Endpoint],
42
45
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
43
46
  )
44
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
47
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
45
48
  if g_param[OptionsDefine.Language]:
46
49
  profile.language = g_param[OptionsDefine.Language]
47
50
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -81,7 +84,10 @@ def doDeleteLogstashInstance(args, parsed_globals):
81
84
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
82
85
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
83
86
  )
84
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
87
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
89
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
90
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
91
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
86
92
  else:
87
93
  cred = credential.Credential(
@@ -93,7 +99,7 @@ def doDeleteLogstashInstance(args, parsed_globals):
93
99
  endpoint=g_param[OptionsDefine.Endpoint],
94
100
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
95
101
  )
96
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
102
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
97
103
  if g_param[OptionsDefine.Language]:
98
104
  profile.language = g_param[OptionsDefine.Language]
99
105
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -133,7 +139,10 @@ def doDeleteInstance(args, parsed_globals):
133
139
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
134
140
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
135
141
  )
136
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
142
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
144
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
145
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
137
146
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
138
147
  else:
139
148
  cred = credential.Credential(
@@ -145,7 +154,7 @@ def doDeleteInstance(args, parsed_globals):
145
154
  endpoint=g_param[OptionsDefine.Endpoint],
146
155
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
147
156
  )
148
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
157
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
149
158
  if g_param[OptionsDefine.Language]:
150
159
  profile.language = g_param[OptionsDefine.Language]
151
160
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -185,7 +194,10 @@ def doGetRequestTargetNodeTypes(args, parsed_globals):
185
194
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
186
195
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
187
196
  )
188
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
197
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
199
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
200
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
189
201
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
190
202
  else:
191
203
  cred = credential.Credential(
@@ -197,7 +209,7 @@ def doGetRequestTargetNodeTypes(args, parsed_globals):
197
209
  endpoint=g_param[OptionsDefine.Endpoint],
198
210
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
199
211
  )
200
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
212
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
201
213
  if g_param[OptionsDefine.Language]:
202
214
  profile.language = g_param[OptionsDefine.Language]
203
215
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -237,7 +249,10 @@ def doStopLogstashPipelines(args, parsed_globals):
237
249
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
238
250
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
239
251
  )
240
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
252
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
254
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
255
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
241
256
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
242
257
  else:
243
258
  cred = credential.Credential(
@@ -249,7 +264,7 @@ def doStopLogstashPipelines(args, parsed_globals):
249
264
  endpoint=g_param[OptionsDefine.Endpoint],
250
265
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
251
266
  )
252
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
267
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
253
268
  if g_param[OptionsDefine.Language]:
254
269
  profile.language = g_param[OptionsDefine.Language]
255
270
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -289,7 +304,10 @@ def doDescribeServerlessSpaces(args, parsed_globals):
289
304
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
290
305
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
291
306
  )
292
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
307
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
309
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
310
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
293
311
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
294
312
  else:
295
313
  cred = credential.Credential(
@@ -301,7 +319,7 @@ def doDescribeServerlessSpaces(args, parsed_globals):
301
319
  endpoint=g_param[OptionsDefine.Endpoint],
302
320
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
303
321
  )
304
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
322
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
305
323
  if g_param[OptionsDefine.Language]:
306
324
  profile.language = g_param[OptionsDefine.Language]
307
325
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -331,6 +349,61 @@ def doDescribeServerlessSpaces(args, parsed_globals):
331
349
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
332
350
 
333
351
 
352
+ def doExportIpTraceLog(args, parsed_globals):
353
+ g_param = parse_global_arg(parsed_globals)
354
+
355
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
356
+ cred = credential.CVMRoleCredential()
357
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
358
+ cred = credential.STSAssumeRoleCredential(
359
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
360
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
361
+ )
362
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
364
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
365
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
366
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
367
+ else:
368
+ cred = credential.Credential(
369
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
370
+ )
371
+ http_profile = HttpProfile(
372
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
373
+ reqMethod="POST",
374
+ endpoint=g_param[OptionsDefine.Endpoint],
375
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
376
+ )
377
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
378
+ if g_param[OptionsDefine.Language]:
379
+ profile.language = g_param[OptionsDefine.Language]
380
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
381
+ client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
382
+ client._sdkVersion += ("_CLI_" + __version__)
383
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
384
+ model = models.ExportIpTraceLogRequest()
385
+ model.from_json_string(json.dumps(args))
386
+ start_time = time.time()
387
+ while True:
388
+ rsp = client.ExportIpTraceLog(model)
389
+ result = rsp.to_json_string()
390
+ try:
391
+ json_obj = json.loads(result)
392
+ except TypeError as e:
393
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
394
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
395
+ break
396
+ cur_time = time.time()
397
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
398
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
399
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
400
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
401
+ else:
402
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
403
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
404
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
405
+
406
+
334
407
  def doInstallInstanceModel(args, parsed_globals):
335
408
  g_param = parse_global_arg(parsed_globals)
336
409
 
@@ -341,7 +414,10 @@ def doInstallInstanceModel(args, parsed_globals):
341
414
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
342
415
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
343
416
  )
344
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
417
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
419
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
420
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
345
421
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
346
422
  else:
347
423
  cred = credential.Credential(
@@ -353,7 +429,7 @@ def doInstallInstanceModel(args, parsed_globals):
353
429
  endpoint=g_param[OptionsDefine.Endpoint],
354
430
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
355
431
  )
356
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
432
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
357
433
  if g_param[OptionsDefine.Language]:
358
434
  profile.language = g_param[OptionsDefine.Language]
359
435
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -393,7 +469,10 @@ def doDescribeIndexList(args, parsed_globals):
393
469
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
394
470
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
395
471
  )
396
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
472
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
474
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
475
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
397
476
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
398
477
  else:
399
478
  cred = credential.Credential(
@@ -405,7 +484,7 @@ def doDescribeIndexList(args, parsed_globals):
405
484
  endpoint=g_param[OptionsDefine.Endpoint],
406
485
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
407
486
  )
408
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
487
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
409
488
  if g_param[OptionsDefine.Language]:
410
489
  profile.language = g_param[OptionsDefine.Language]
411
490
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -445,7 +524,10 @@ def doDescribeInstanceOperations(args, parsed_globals):
445
524
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
446
525
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
447
526
  )
448
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
527
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
529
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
530
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
449
531
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
450
532
  else:
451
533
  cred = credential.Credential(
@@ -457,7 +539,7 @@ def doDescribeInstanceOperations(args, parsed_globals):
457
539
  endpoint=g_param[OptionsDefine.Endpoint],
458
540
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
459
541
  )
460
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
542
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
461
543
  if g_param[OptionsDefine.Language]:
462
544
  profile.language = g_param[OptionsDefine.Language]
463
545
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -497,7 +579,10 @@ def doDescribeLogstashInstances(args, parsed_globals):
497
579
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
498
580
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
499
581
  )
500
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
582
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
584
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
585
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
501
586
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
502
587
  else:
503
588
  cred = credential.Credential(
@@ -509,7 +594,7 @@ def doDescribeLogstashInstances(args, parsed_globals):
509
594
  endpoint=g_param[OptionsDefine.Endpoint],
510
595
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
511
596
  )
512
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
597
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
513
598
  if g_param[OptionsDefine.Language]:
514
599
  profile.language = g_param[OptionsDefine.Language]
515
600
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -549,7 +634,10 @@ def doRestoreClusterSnapshot(args, parsed_globals):
549
634
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
550
635
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
551
636
  )
552
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
637
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
639
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
640
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
553
641
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
554
642
  else:
555
643
  cred = credential.Credential(
@@ -561,7 +649,7 @@ def doRestoreClusterSnapshot(args, parsed_globals):
561
649
  endpoint=g_param[OptionsDefine.Endpoint],
562
650
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
563
651
  )
564
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
652
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
565
653
  if g_param[OptionsDefine.Language]:
566
654
  profile.language = g_param[OptionsDefine.Language]
567
655
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -601,7 +689,10 @@ def doGetDiagnoseSettings(args, parsed_globals):
601
689
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
602
690
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
603
691
  )
604
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
692
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
694
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
695
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
605
696
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
606
697
  else:
607
698
  cred = credential.Credential(
@@ -613,7 +704,7 @@ def doGetDiagnoseSettings(args, parsed_globals):
613
704
  endpoint=g_param[OptionsDefine.Endpoint],
614
705
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
615
706
  )
616
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
707
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
617
708
  if g_param[OptionsDefine.Language]:
618
709
  profile.language = g_param[OptionsDefine.Language]
619
710
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -653,7 +744,10 @@ def doCreateIndex(args, parsed_globals):
653
744
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
654
745
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
655
746
  )
656
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
747
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
749
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
750
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
657
751
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
658
752
  else:
659
753
  cred = credential.Credential(
@@ -665,7 +759,7 @@ def doCreateIndex(args, parsed_globals):
665
759
  endpoint=g_param[OptionsDefine.Endpoint],
666
760
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
667
761
  )
668
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
762
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
669
763
  if g_param[OptionsDefine.Language]:
670
764
  profile.language = g_param[OptionsDefine.Language]
671
765
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -705,7 +799,10 @@ def doUpdateDiagnoseSettings(args, parsed_globals):
705
799
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
706
800
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
707
801
  )
708
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
802
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
804
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
805
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
709
806
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
710
807
  else:
711
808
  cred = credential.Credential(
@@ -717,7 +814,7 @@ def doUpdateDiagnoseSettings(args, parsed_globals):
717
814
  endpoint=g_param[OptionsDefine.Endpoint],
718
815
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
719
816
  )
720
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
817
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
721
818
  if g_param[OptionsDefine.Language]:
722
819
  profile.language = g_param[OptionsDefine.Language]
723
820
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -757,7 +854,10 @@ def doCreateCosMigrateToServerlessInstance(args, parsed_globals):
757
854
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
758
855
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
759
856
  )
760
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
857
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
859
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
860
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
761
861
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
762
862
  else:
763
863
  cred = credential.Credential(
@@ -769,7 +869,7 @@ def doCreateCosMigrateToServerlessInstance(args, parsed_globals):
769
869
  endpoint=g_param[OptionsDefine.Endpoint],
770
870
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
771
871
  )
772
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
872
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
773
873
  if g_param[OptionsDefine.Language]:
774
874
  profile.language = g_param[OptionsDefine.Language]
775
875
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -809,7 +909,10 @@ def doUpdatePlugins(args, parsed_globals):
809
909
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
810
910
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
811
911
  )
812
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
912
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
914
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
915
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
813
916
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
814
917
  else:
815
918
  cred = credential.Credential(
@@ -821,7 +924,7 @@ def doUpdatePlugins(args, parsed_globals):
821
924
  endpoint=g_param[OptionsDefine.Endpoint],
822
925
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
823
926
  )
824
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
927
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
825
928
  if g_param[OptionsDefine.Language]:
826
929
  profile.language = g_param[OptionsDefine.Language]
827
930
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -861,7 +964,10 @@ def doGetDocumentParseResult(args, parsed_globals):
861
964
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
862
965
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
863
966
  )
864
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
969
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
970
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
865
971
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
866
972
  else:
867
973
  cred = credential.Credential(
@@ -873,7 +979,7 @@ def doGetDocumentParseResult(args, parsed_globals):
873
979
  endpoint=g_param[OptionsDefine.Endpoint],
874
980
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
875
981
  )
876
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
982
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
877
983
  if g_param[OptionsDefine.Language]:
878
984
  profile.language = g_param[OptionsDefine.Language]
879
985
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -913,7 +1019,10 @@ def doUpdateLogstashInstance(args, parsed_globals):
913
1019
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
914
1020
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
915
1021
  )
916
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1022
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1024
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1025
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
917
1026
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
918
1027
  else:
919
1028
  cred = credential.Credential(
@@ -925,7 +1034,7 @@ def doUpdateLogstashInstance(args, parsed_globals):
925
1034
  endpoint=g_param[OptionsDefine.Endpoint],
926
1035
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
927
1036
  )
928
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1037
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
929
1038
  if g_param[OptionsDefine.Language]:
930
1039
  profile.language = g_param[OptionsDefine.Language]
931
1040
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -965,7 +1074,10 @@ def doCheckMigrateIndexMetaData(args, parsed_globals):
965
1074
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
966
1075
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
967
1076
  )
968
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1077
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1079
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1080
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
969
1081
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
970
1082
  else:
971
1083
  cred = credential.Credential(
@@ -977,7 +1089,7 @@ def doCheckMigrateIndexMetaData(args, parsed_globals):
977
1089
  endpoint=g_param[OptionsDefine.Endpoint],
978
1090
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
979
1091
  )
980
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1092
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
981
1093
  if g_param[OptionsDefine.Language]:
982
1094
  profile.language = g_param[OptionsDefine.Language]
983
1095
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1017,7 +1129,10 @@ def doUpdateJdk(args, parsed_globals):
1017
1129
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
1130
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
1131
  )
1020
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1132
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1134
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1135
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1021
1136
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1022
1137
  else:
1023
1138
  cred = credential.Credential(
@@ -1029,7 +1144,7 @@ def doUpdateJdk(args, parsed_globals):
1029
1144
  endpoint=g_param[OptionsDefine.Endpoint],
1030
1145
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1031
1146
  )
1032
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1147
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1033
1148
  if g_param[OptionsDefine.Language]:
1034
1149
  profile.language = g_param[OptionsDefine.Language]
1035
1150
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1069,7 +1184,10 @@ def doCreateServerlessSpaceV2(args, parsed_globals):
1069
1184
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1070
1185
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1071
1186
  )
1072
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1187
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1189
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1190
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1073
1191
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1074
1192
  else:
1075
1193
  cred = credential.Credential(
@@ -1081,7 +1199,7 @@ def doCreateServerlessSpaceV2(args, parsed_globals):
1081
1199
  endpoint=g_param[OptionsDefine.Endpoint],
1082
1200
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1083
1201
  )
1084
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1202
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1085
1203
  if g_param[OptionsDefine.Language]:
1086
1204
  profile.language = g_param[OptionsDefine.Language]
1087
1205
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1121,7 +1239,10 @@ def doDeleteServerlessInstance(args, parsed_globals):
1121
1239
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1122
1240
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1123
1241
  )
1124
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1242
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1244
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1245
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1125
1246
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1126
1247
  else:
1127
1248
  cred = credential.Credential(
@@ -1133,7 +1254,7 @@ def doDeleteServerlessInstance(args, parsed_globals):
1133
1254
  endpoint=g_param[OptionsDefine.Endpoint],
1134
1255
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1135
1256
  )
1136
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1257
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1137
1258
  if g_param[OptionsDefine.Language]:
1138
1259
  profile.language = g_param[OptionsDefine.Language]
1139
1260
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1173,7 +1294,10 @@ def doRunRerank(args, parsed_globals):
1173
1294
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1174
1295
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1175
1296
  )
1176
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1297
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1299
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1300
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1177
1301
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1178
1302
  else:
1179
1303
  cred = credential.Credential(
@@ -1185,7 +1309,7 @@ def doRunRerank(args, parsed_globals):
1185
1309
  endpoint=g_param[OptionsDefine.Endpoint],
1186
1310
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1187
1311
  )
1188
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1312
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1189
1313
  if g_param[OptionsDefine.Language]:
1190
1314
  profile.language = g_param[OptionsDefine.Language]
1191
1315
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1225,7 +1349,10 @@ def doDescribeClusterSnapshot(args, parsed_globals):
1225
1349
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1226
1350
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1227
1351
  )
1228
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1352
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1354
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1355
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1229
1356
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1230
1357
  else:
1231
1358
  cred = credential.Credential(
@@ -1237,7 +1364,7 @@ def doDescribeClusterSnapshot(args, parsed_globals):
1237
1364
  endpoint=g_param[OptionsDefine.Endpoint],
1238
1365
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1239
1366
  )
1240
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1367
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1241
1368
  if g_param[OptionsDefine.Language]:
1242
1369
  profile.language = g_param[OptionsDefine.Language]
1243
1370
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1277,7 +1404,10 @@ def doCreateLogstashInstance(args, parsed_globals):
1277
1404
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1278
1405
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1279
1406
  )
1280
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1407
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1409
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1410
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1281
1411
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1282
1412
  else:
1283
1413
  cred = credential.Credential(
@@ -1289,7 +1419,7 @@ def doCreateLogstashInstance(args, parsed_globals):
1289
1419
  endpoint=g_param[OptionsDefine.Endpoint],
1290
1420
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1291
1421
  )
1292
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1422
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1293
1423
  if g_param[OptionsDefine.Language]:
1294
1424
  profile.language = g_param[OptionsDefine.Language]
1295
1425
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1329,7 +1459,10 @@ def doRestartInstance(args, parsed_globals):
1329
1459
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1330
1460
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1331
1461
  )
1332
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1462
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1464
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1465
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1333
1466
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1334
1467
  else:
1335
1468
  cred = credential.Credential(
@@ -1341,7 +1474,7 @@ def doRestartInstance(args, parsed_globals):
1341
1474
  endpoint=g_param[OptionsDefine.Endpoint],
1342
1475
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1343
1476
  )
1344
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1477
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1345
1478
  if g_param[OptionsDefine.Language]:
1346
1479
  profile.language = g_param[OptionsDefine.Language]
1347
1480
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1371,6 +1504,61 @@ def doRestartInstance(args, parsed_globals):
1371
1504
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1372
1505
 
1373
1506
 
1507
+ def doGetIpTraceStatus(args, parsed_globals):
1508
+ g_param = parse_global_arg(parsed_globals)
1509
+
1510
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1511
+ cred = credential.CVMRoleCredential()
1512
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1513
+ cred = credential.STSAssumeRoleCredential(
1514
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1515
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1516
+ )
1517
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1519
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1520
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1521
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1522
+ else:
1523
+ cred = credential.Credential(
1524
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1525
+ )
1526
+ http_profile = HttpProfile(
1527
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1528
+ reqMethod="POST",
1529
+ endpoint=g_param[OptionsDefine.Endpoint],
1530
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1531
+ )
1532
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1533
+ if g_param[OptionsDefine.Language]:
1534
+ profile.language = g_param[OptionsDefine.Language]
1535
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1536
+ client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
1537
+ client._sdkVersion += ("_CLI_" + __version__)
1538
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1539
+ model = models.GetIpTraceStatusRequest()
1540
+ model.from_json_string(json.dumps(args))
1541
+ start_time = time.time()
1542
+ while True:
1543
+ rsp = client.GetIpTraceStatus(model)
1544
+ result = rsp.to_json_string()
1545
+ try:
1546
+ json_obj = json.loads(result)
1547
+ except TypeError as e:
1548
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1549
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1550
+ break
1551
+ cur_time = time.time()
1552
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1553
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1554
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1555
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1556
+ else:
1557
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1558
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1559
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1560
+
1561
+
1374
1562
  def doUpdateInstance(args, parsed_globals):
1375
1563
  g_param = parse_global_arg(parsed_globals)
1376
1564
 
@@ -1381,7 +1569,10 @@ def doUpdateInstance(args, parsed_globals):
1381
1569
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1382
1570
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1383
1571
  )
1384
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1572
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1574
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1575
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1385
1576
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1386
1577
  else:
1387
1578
  cred = credential.Credential(
@@ -1393,7 +1584,7 @@ def doUpdateInstance(args, parsed_globals):
1393
1584
  endpoint=g_param[OptionsDefine.Endpoint],
1394
1585
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1395
1586
  )
1396
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1587
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1397
1588
  if g_param[OptionsDefine.Language]:
1398
1589
  profile.language = g_param[OptionsDefine.Language]
1399
1590
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1433,7 +1624,10 @@ def doDescribeInstanceLogs(args, parsed_globals):
1433
1624
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1434
1625
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1435
1626
  )
1436
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1627
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1629
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1630
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1437
1631
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1438
1632
  else:
1439
1633
  cred = credential.Credential(
@@ -1445,7 +1639,7 @@ def doDescribeInstanceLogs(args, parsed_globals):
1445
1639
  endpoint=g_param[OptionsDefine.Endpoint],
1446
1640
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1447
1641
  )
1448
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1642
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1449
1643
  if g_param[OptionsDefine.Language]:
1450
1644
  profile.language = g_param[OptionsDefine.Language]
1451
1645
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1485,7 +1679,10 @@ def doRestartKibana(args, parsed_globals):
1485
1679
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1486
1680
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1487
1681
  )
1488
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1682
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1684
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1685
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1489
1686
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1490
1687
  else:
1491
1688
  cred = credential.Credential(
@@ -1497,7 +1694,7 @@ def doRestartKibana(args, parsed_globals):
1497
1694
  endpoint=g_param[OptionsDefine.Endpoint],
1498
1695
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1499
1696
  )
1500
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1697
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1501
1698
  if g_param[OptionsDefine.Language]:
1502
1699
  profile.language = g_param[OptionsDefine.Language]
1503
1700
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1537,7 +1734,10 @@ def doUpdateLogstashPipelineDesc(args, parsed_globals):
1537
1734
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1538
1735
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1539
1736
  )
1540
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1737
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1739
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1740
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1541
1741
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1542
1742
  else:
1543
1743
  cred = credential.Credential(
@@ -1549,7 +1749,7 @@ def doUpdateLogstashPipelineDesc(args, parsed_globals):
1549
1749
  endpoint=g_param[OptionsDefine.Endpoint],
1550
1750
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1551
1751
  )
1552
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1752
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1553
1753
  if g_param[OptionsDefine.Language]:
1554
1754
  profile.language = g_param[OptionsDefine.Language]
1555
1755
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1589,7 +1789,10 @@ def doCreateServerlessInstance(args, parsed_globals):
1589
1789
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1590
1790
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1591
1791
  )
1592
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1792
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1794
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1795
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1593
1796
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1594
1797
  else:
1595
1798
  cred = credential.Credential(
@@ -1601,7 +1804,7 @@ def doCreateServerlessInstance(args, parsed_globals):
1601
1804
  endpoint=g_param[OptionsDefine.Endpoint],
1602
1805
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1603
1806
  )
1604
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1807
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1605
1808
  if g_param[OptionsDefine.Language]:
1606
1809
  profile.language = g_param[OptionsDefine.Language]
1607
1810
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1641,7 +1844,10 @@ def doDescribeViews(args, parsed_globals):
1641
1844
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1642
1845
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1643
1846
  )
1644
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1847
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1849
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1850
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1645
1851
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1646
1852
  else:
1647
1853
  cred = credential.Credential(
@@ -1653,7 +1859,7 @@ def doDescribeViews(args, parsed_globals):
1653
1859
  endpoint=g_param[OptionsDefine.Endpoint],
1654
1860
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1655
1861
  )
1656
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1862
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1657
1863
  if g_param[OptionsDefine.Language]:
1658
1864
  profile.language = g_param[OptionsDefine.Language]
1659
1865
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1693,7 +1899,10 @@ def doUpdateRequestTargetNodeTypes(args, parsed_globals):
1693
1899
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1694
1900
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1695
1901
  )
1696
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1902
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1904
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1905
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1697
1906
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1698
1907
  else:
1699
1908
  cred = credential.Credential(
@@ -1705,7 +1914,7 @@ def doUpdateRequestTargetNodeTypes(args, parsed_globals):
1705
1914
  endpoint=g_param[OptionsDefine.Endpoint],
1706
1915
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1707
1916
  )
1708
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1917
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1709
1918
  if g_param[OptionsDefine.Language]:
1710
1919
  profile.language = g_param[OptionsDefine.Language]
1711
1920
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1745,7 +1954,10 @@ def doChunkDocumentAsync(args, parsed_globals):
1745
1954
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1746
1955
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1747
1956
  )
1748
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1957
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1959
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1960
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1749
1961
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1750
1962
  else:
1751
1963
  cred = credential.Credential(
@@ -1757,7 +1969,7 @@ def doChunkDocumentAsync(args, parsed_globals):
1757
1969
  endpoint=g_param[OptionsDefine.Endpoint],
1758
1970
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1759
1971
  )
1760
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1972
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1761
1973
  if g_param[OptionsDefine.Language]:
1762
1974
  profile.language = g_param[OptionsDefine.Language]
1763
1975
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1797,7 +2009,10 @@ def doDescribeSpaceKibanaTools(args, parsed_globals):
1797
2009
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1798
2010
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1799
2011
  )
1800
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2012
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2014
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2015
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1801
2016
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1802
2017
  else:
1803
2018
  cred = credential.Credential(
@@ -1809,7 +2024,7 @@ def doDescribeSpaceKibanaTools(args, parsed_globals):
1809
2024
  endpoint=g_param[OptionsDefine.Endpoint],
1810
2025
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1811
2026
  )
1812
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2027
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1813
2028
  if g_param[OptionsDefine.Language]:
1814
2029
  profile.language = g_param[OptionsDefine.Language]
1815
2030
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1849,7 +2064,10 @@ def doDescribeLogstashPipelines(args, parsed_globals):
1849
2064
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1850
2065
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1851
2066
  )
1852
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2067
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2069
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2070
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1853
2071
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1854
2072
  else:
1855
2073
  cred = credential.Credential(
@@ -1861,7 +2079,7 @@ def doDescribeLogstashPipelines(args, parsed_globals):
1861
2079
  endpoint=g_param[OptionsDefine.Endpoint],
1862
2080
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1863
2081
  )
1864
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2082
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1865
2083
  if g_param[OptionsDefine.Language]:
1866
2084
  profile.language = g_param[OptionsDefine.Language]
1867
2085
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1901,7 +2119,10 @@ def doGetDocumentChunkResult(args, parsed_globals):
1901
2119
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1902
2120
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1903
2121
  )
1904
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2122
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2124
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2125
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1905
2126
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1906
2127
  else:
1907
2128
  cred = credential.Credential(
@@ -1913,7 +2134,7 @@ def doGetDocumentChunkResult(args, parsed_globals):
1913
2134
  endpoint=g_param[OptionsDefine.Endpoint],
1914
2135
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1915
2136
  )
1916
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2137
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1917
2138
  if g_param[OptionsDefine.Language]:
1918
2139
  profile.language = g_param[OptionsDefine.Language]
1919
2140
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1953,7 +2174,10 @@ def doDescribeUserCosSnapshotList(args, parsed_globals):
1953
2174
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1954
2175
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1955
2176
  )
1956
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2177
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2179
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2180
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1957
2181
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1958
2182
  else:
1959
2183
  cred = credential.Credential(
@@ -1965,7 +2189,7 @@ def doDescribeUserCosSnapshotList(args, parsed_globals):
1965
2189
  endpoint=g_param[OptionsDefine.Endpoint],
1966
2190
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1967
2191
  )
1968
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2192
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1969
2193
  if g_param[OptionsDefine.Language]:
1970
2194
  profile.language = g_param[OptionsDefine.Language]
1971
2195
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2005,7 +2229,10 @@ def doModifyEsVipSecurityGroup(args, parsed_globals):
2005
2229
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2006
2230
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2007
2231
  )
2008
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2232
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2234
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2235
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2009
2236
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2010
2237
  else:
2011
2238
  cred = credential.Credential(
@@ -2017,7 +2244,7 @@ def doModifyEsVipSecurityGroup(args, parsed_globals):
2017
2244
  endpoint=g_param[OptionsDefine.Endpoint],
2018
2245
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2019
2246
  )
2020
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2247
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2021
2248
  if g_param[OptionsDefine.Language]:
2022
2249
  profile.language = g_param[OptionsDefine.Language]
2023
2250
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2057,7 +2284,10 @@ def doCreateInstance(args, parsed_globals):
2057
2284
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2058
2285
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2059
2286
  )
2060
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2287
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2289
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2290
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2061
2291
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2062
2292
  else:
2063
2293
  cred = credential.Credential(
@@ -2069,7 +2299,7 @@ def doCreateInstance(args, parsed_globals):
2069
2299
  endpoint=g_param[OptionsDefine.Endpoint],
2070
2300
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2071
2301
  )
2072
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2302
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2073
2303
  if g_param[OptionsDefine.Language]:
2074
2304
  profile.language = g_param[OptionsDefine.Language]
2075
2305
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2109,7 +2339,10 @@ def doUpdateServerlessInstance(args, parsed_globals):
2109
2339
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2110
2340
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2111
2341
  )
2112
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2342
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2344
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2345
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2113
2346
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2114
2347
  else:
2115
2348
  cred = credential.Credential(
@@ -2121,7 +2354,7 @@ def doUpdateServerlessInstance(args, parsed_globals):
2121
2354
  endpoint=g_param[OptionsDefine.Endpoint],
2122
2355
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2123
2356
  )
2124
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2357
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2125
2358
  if g_param[OptionsDefine.Language]:
2126
2359
  profile.language = g_param[OptionsDefine.Language]
2127
2360
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2151,7 +2384,7 @@ def doUpdateServerlessInstance(args, parsed_globals):
2151
2384
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2152
2385
 
2153
2386
 
2154
- def doRestartLogstashInstance(args, parsed_globals):
2387
+ def doQueryIpTraceLog(args, parsed_globals):
2155
2388
  g_param = parse_global_arg(parsed_globals)
2156
2389
 
2157
2390
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2161,7 +2394,10 @@ def doRestartLogstashInstance(args, parsed_globals):
2161
2394
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2162
2395
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2163
2396
  )
2164
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2397
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2399
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2400
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2165
2401
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2166
2402
  else:
2167
2403
  cred = credential.Credential(
@@ -2173,18 +2409,18 @@ def doRestartLogstashInstance(args, parsed_globals):
2173
2409
  endpoint=g_param[OptionsDefine.Endpoint],
2174
2410
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2175
2411
  )
2176
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2412
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2177
2413
  if g_param[OptionsDefine.Language]:
2178
2414
  profile.language = g_param[OptionsDefine.Language]
2179
2415
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2180
2416
  client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
2181
2417
  client._sdkVersion += ("_CLI_" + __version__)
2182
2418
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2183
- model = models.RestartLogstashInstanceRequest()
2419
+ model = models.QueryIpTraceLogRequest()
2184
2420
  model.from_json_string(json.dumps(args))
2185
2421
  start_time = time.time()
2186
2422
  while True:
2187
- rsp = client.RestartLogstashInstance(model)
2423
+ rsp = client.QueryIpTraceLog(model)
2188
2424
  result = rsp.to_json_string()
2189
2425
  try:
2190
2426
  json_obj = json.loads(result)
@@ -2213,7 +2449,10 @@ def doGetTextEmbedding(args, parsed_globals):
2213
2449
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2214
2450
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2215
2451
  )
2216
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2452
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2454
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2455
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2217
2456
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2218
2457
  else:
2219
2458
  cred = credential.Credential(
@@ -2225,7 +2464,7 @@ def doGetTextEmbedding(args, parsed_globals):
2225
2464
  endpoint=g_param[OptionsDefine.Endpoint],
2226
2465
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2227
2466
  )
2228
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2467
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2229
2468
  if g_param[OptionsDefine.Language]:
2230
2469
  profile.language = g_param[OptionsDefine.Language]
2231
2470
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2265,7 +2504,10 @@ def doDescribeDiagnose(args, parsed_globals):
2265
2504
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2266
2505
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2267
2506
  )
2268
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2507
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2509
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2510
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2269
2511
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2270
2512
  else:
2271
2513
  cred = credential.Credential(
@@ -2277,7 +2519,7 @@ def doDescribeDiagnose(args, parsed_globals):
2277
2519
  endpoint=g_param[OptionsDefine.Endpoint],
2278
2520
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2279
2521
  )
2280
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2522
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2281
2523
  if g_param[OptionsDefine.Language]:
2282
2524
  profile.language = g_param[OptionsDefine.Language]
2283
2525
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2317,7 +2559,10 @@ def doParseDocument(args, parsed_globals):
2317
2559
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2318
2560
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2319
2561
  )
2320
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2562
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2564
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2565
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2321
2566
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2322
2567
  else:
2323
2568
  cred = credential.Credential(
@@ -2329,7 +2574,7 @@ def doParseDocument(args, parsed_globals):
2329
2574
  endpoint=g_param[OptionsDefine.Endpoint],
2330
2575
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2331
2576
  )
2332
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2577
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2333
2578
  if g_param[OptionsDefine.Language]:
2334
2579
  profile.language = g_param[OptionsDefine.Language]
2335
2580
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2369,7 +2614,10 @@ def doUpdateDictionaries(args, parsed_globals):
2369
2614
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2370
2615
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2371
2616
  )
2372
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2617
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2619
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2620
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2373
2621
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2374
2622
  else:
2375
2623
  cred = credential.Credential(
@@ -2381,7 +2629,7 @@ def doUpdateDictionaries(args, parsed_globals):
2381
2629
  endpoint=g_param[OptionsDefine.Endpoint],
2382
2630
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2383
2631
  )
2384
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2632
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2385
2633
  if g_param[OptionsDefine.Language]:
2386
2634
  profile.language = g_param[OptionsDefine.Language]
2387
2635
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2421,7 +2669,10 @@ def doUpdateIndex(args, parsed_globals):
2421
2669
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2422
2670
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2423
2671
  )
2424
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2672
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2674
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2675
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2425
2676
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2426
2677
  else:
2427
2678
  cred = credential.Credential(
@@ -2433,7 +2684,7 @@ def doUpdateIndex(args, parsed_globals):
2433
2684
  endpoint=g_param[OptionsDefine.Endpoint],
2434
2685
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2435
2686
  )
2436
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2687
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2437
2688
  if g_param[OptionsDefine.Language]:
2438
2689
  profile.language = g_param[OptionsDefine.Language]
2439
2690
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2473,7 +2724,10 @@ def doDescribeLogstashInstanceOperations(args, parsed_globals):
2473
2724
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2474
2725
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2475
2726
  )
2476
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2727
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2729
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2730
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2477
2731
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2478
2732
  else:
2479
2733
  cred = credential.Credential(
@@ -2485,7 +2739,7 @@ def doDescribeLogstashInstanceOperations(args, parsed_globals):
2485
2739
  endpoint=g_param[OptionsDefine.Endpoint],
2486
2740
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2487
2741
  )
2488
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2742
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2489
2743
  if g_param[OptionsDefine.Language]:
2490
2744
  profile.language = g_param[OptionsDefine.Language]
2491
2745
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2525,7 +2779,10 @@ def doDescribeInstances(args, parsed_globals):
2525
2779
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2526
2780
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2527
2781
  )
2528
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2782
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2784
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2785
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2529
2786
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2530
2787
  else:
2531
2788
  cred = credential.Credential(
@@ -2537,7 +2794,7 @@ def doDescribeInstances(args, parsed_globals):
2537
2794
  endpoint=g_param[OptionsDefine.Endpoint],
2538
2795
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2539
2796
  )
2540
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2797
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2541
2798
  if g_param[OptionsDefine.Language]:
2542
2799
  profile.language = g_param[OptionsDefine.Language]
2543
2800
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2577,7 +2834,10 @@ def doUpdateServerlessSpace(args, parsed_globals):
2577
2834
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2578
2835
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2579
2836
  )
2580
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2837
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2839
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2840
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2581
2841
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2582
2842
  else:
2583
2843
  cred = credential.Credential(
@@ -2589,7 +2849,7 @@ def doUpdateServerlessSpace(args, parsed_globals):
2589
2849
  endpoint=g_param[OptionsDefine.Endpoint],
2590
2850
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2591
2851
  )
2592
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2852
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2593
2853
  if g_param[OptionsDefine.Language]:
2594
2854
  profile.language = g_param[OptionsDefine.Language]
2595
2855
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2629,7 +2889,10 @@ def doStartLogstashPipelines(args, parsed_globals):
2629
2889
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2630
2890
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2631
2891
  )
2632
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2892
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2894
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2895
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2633
2896
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2634
2897
  else:
2635
2898
  cred = credential.Credential(
@@ -2641,7 +2904,7 @@ def doStartLogstashPipelines(args, parsed_globals):
2641
2904
  endpoint=g_param[OptionsDefine.Endpoint],
2642
2905
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2643
2906
  )
2644
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2907
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2645
2908
  if g_param[OptionsDefine.Language]:
2646
2909
  profile.language = g_param[OptionsDefine.Language]
2647
2910
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2681,7 +2944,10 @@ def doUpgradeInstance(args, parsed_globals):
2681
2944
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2682
2945
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2683
2946
  )
2684
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2947
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2949
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2950
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2685
2951
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2686
2952
  else:
2687
2953
  cred = credential.Credential(
@@ -2693,7 +2959,7 @@ def doUpgradeInstance(args, parsed_globals):
2693
2959
  endpoint=g_param[OptionsDefine.Endpoint],
2694
2960
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2695
2961
  )
2696
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2962
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2697
2963
  if g_param[OptionsDefine.Language]:
2698
2964
  profile.language = g_param[OptionsDefine.Language]
2699
2965
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2733,7 +2999,10 @@ def doDeleteServerlessSpaceUser(args, parsed_globals):
2733
2999
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2734
3000
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2735
3001
  )
2736
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3002
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3004
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3005
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2737
3006
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2738
3007
  else:
2739
3008
  cred = credential.Credential(
@@ -2745,7 +3014,7 @@ def doDeleteServerlessSpaceUser(args, parsed_globals):
2745
3014
  endpoint=g_param[OptionsDefine.Endpoint],
2746
3015
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2747
3016
  )
2748
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3017
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2749
3018
  if g_param[OptionsDefine.Language]:
2750
3019
  profile.language = g_param[OptionsDefine.Language]
2751
3020
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2785,7 +3054,10 @@ def doDeleteClusterSnapshot(args, parsed_globals):
2785
3054
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2786
3055
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2787
3056
  )
2788
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3057
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3059
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3060
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2789
3061
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2790
3062
  else:
2791
3063
  cred = credential.Credential(
@@ -2797,7 +3069,7 @@ def doDeleteClusterSnapshot(args, parsed_globals):
2797
3069
  endpoint=g_param[OptionsDefine.Endpoint],
2798
3070
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2799
3071
  )
2800
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3072
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2801
3073
  if g_param[OptionsDefine.Language]:
2802
3074
  profile.language = g_param[OptionsDefine.Language]
2803
3075
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2837,7 +3109,10 @@ def doDescribeLogstashInstanceLogs(args, parsed_globals):
2837
3109
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2838
3110
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2839
3111
  )
2840
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3112
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3114
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3115
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2841
3116
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2842
3117
  else:
2843
3118
  cred = credential.Credential(
@@ -2849,7 +3124,7 @@ def doDescribeLogstashInstanceLogs(args, parsed_globals):
2849
3124
  endpoint=g_param[OptionsDefine.Endpoint],
2850
3125
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2851
3126
  )
2852
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3127
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2853
3128
  if g_param[OptionsDefine.Language]:
2854
3129
  profile.language = g_param[OptionsDefine.Language]
2855
3130
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2889,7 +3164,10 @@ def doDescribeServerlessMetrics(args, parsed_globals):
2889
3164
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2890
3165
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2891
3166
  )
2892
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3167
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3169
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3170
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2893
3171
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2894
3172
  else:
2895
3173
  cred = credential.Credential(
@@ -2901,7 +3179,7 @@ def doDescribeServerlessMetrics(args, parsed_globals):
2901
3179
  endpoint=g_param[OptionsDefine.Endpoint],
2902
3180
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2903
3181
  )
2904
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3182
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2905
3183
  if g_param[OptionsDefine.Language]:
2906
3184
  profile.language = g_param[OptionsDefine.Language]
2907
3185
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2941,7 +3219,10 @@ def doRestartNodes(args, parsed_globals):
2941
3219
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2942
3220
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2943
3221
  )
2944
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3222
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3224
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3225
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
3226
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2946
3227
  else:
2947
3228
  cred = credential.Credential(
@@ -2953,7 +3234,7 @@ def doRestartNodes(args, parsed_globals):
2953
3234
  endpoint=g_param[OptionsDefine.Endpoint],
2954
3235
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2955
3236
  )
2956
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3237
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2957
3238
  if g_param[OptionsDefine.Language]:
2958
3239
  profile.language = g_param[OptionsDefine.Language]
2959
3240
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2993,7 +3274,10 @@ def doParseDocumentAsync(args, parsed_globals):
2993
3274
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2994
3275
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2995
3276
  )
2996
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3277
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3279
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3280
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2997
3281
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2998
3282
  else:
2999
3283
  cred = credential.Credential(
@@ -3005,7 +3289,7 @@ def doParseDocumentAsync(args, parsed_globals):
3005
3289
  endpoint=g_param[OptionsDefine.Endpoint],
3006
3290
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3007
3291
  )
3008
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3292
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3009
3293
  if g_param[OptionsDefine.Language]:
3010
3294
  profile.language = g_param[OptionsDefine.Language]
3011
3295
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3045,7 +3329,10 @@ def doDescribeServerlessSpaceUser(args, parsed_globals):
3045
3329
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3046
3330
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3047
3331
  )
3048
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3332
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3334
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3335
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3049
3336
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3050
3337
  else:
3051
3338
  cred = credential.Credential(
@@ -3057,7 +3344,7 @@ def doDescribeServerlessSpaceUser(args, parsed_globals):
3057
3344
  endpoint=g_param[OptionsDefine.Endpoint],
3058
3345
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3059
3346
  )
3060
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3347
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3061
3348
  if g_param[OptionsDefine.Language]:
3062
3349
  profile.language = g_param[OptionsDefine.Language]
3063
3350
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3087,6 +3374,61 @@ def doDescribeServerlessSpaceUser(args, parsed_globals):
3087
3374
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3088
3375
 
3089
3376
 
3377
+ def doRestartLogstashInstance(args, parsed_globals):
3378
+ g_param = parse_global_arg(parsed_globals)
3379
+
3380
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3381
+ cred = credential.CVMRoleCredential()
3382
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3383
+ cred = credential.STSAssumeRoleCredential(
3384
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3385
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3386
+ )
3387
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3389
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3390
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3391
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3392
+ else:
3393
+ cred = credential.Credential(
3394
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3395
+ )
3396
+ http_profile = HttpProfile(
3397
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3398
+ reqMethod="POST",
3399
+ endpoint=g_param[OptionsDefine.Endpoint],
3400
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3401
+ )
3402
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3403
+ if g_param[OptionsDefine.Language]:
3404
+ profile.language = g_param[OptionsDefine.Language]
3405
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3406
+ client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
3407
+ client._sdkVersion += ("_CLI_" + __version__)
3408
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3409
+ model = models.RestartLogstashInstanceRequest()
3410
+ model.from_json_string(json.dumps(args))
3411
+ start_time = time.time()
3412
+ while True:
3413
+ rsp = client.RestartLogstashInstance(model)
3414
+ result = rsp.to_json_string()
3415
+ try:
3416
+ json_obj = json.loads(result)
3417
+ except TypeError as e:
3418
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3419
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3420
+ break
3421
+ cur_time = time.time()
3422
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3423
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3424
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3425
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3426
+ else:
3427
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3428
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3429
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3430
+
3431
+
3090
3432
  def doDeleteIndex(args, parsed_globals):
3091
3433
  g_param = parse_global_arg(parsed_globals)
3092
3434
 
@@ -3097,7 +3439,10 @@ def doDeleteIndex(args, parsed_globals):
3097
3439
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3098
3440
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3099
3441
  )
3100
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3442
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3444
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3445
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3101
3446
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3102
3447
  else:
3103
3448
  cred = credential.Credential(
@@ -3109,7 +3454,7 @@ def doDeleteIndex(args, parsed_globals):
3109
3454
  endpoint=g_param[OptionsDefine.Endpoint],
3110
3455
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3111
3456
  )
3112
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3457
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3113
3458
  if g_param[OptionsDefine.Language]:
3114
3459
  profile.language = g_param[OptionsDefine.Language]
3115
3460
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3149,7 +3494,10 @@ def doSaveAndDeployLogstashPipeline(args, parsed_globals):
3149
3494
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3150
3495
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3151
3496
  )
3152
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3497
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3499
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3500
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3153
3501
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3154
3502
  else:
3155
3503
  cred = credential.Credential(
@@ -3161,7 +3509,7 @@ def doSaveAndDeployLogstashPipeline(args, parsed_globals):
3161
3509
  endpoint=g_param[OptionsDefine.Endpoint],
3162
3510
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3163
3511
  )
3164
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3512
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3165
3513
  if g_param[OptionsDefine.Language]:
3166
3514
  profile.language = g_param[OptionsDefine.Language]
3167
3515
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3201,7 +3549,10 @@ def doDeleteLogstashPipelines(args, parsed_globals):
3201
3549
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3202
3550
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3203
3551
  )
3204
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3552
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3554
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3555
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3205
3556
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3206
3557
  else:
3207
3558
  cred = credential.Credential(
@@ -3213,7 +3564,7 @@ def doDeleteLogstashPipelines(args, parsed_globals):
3213
3564
  endpoint=g_param[OptionsDefine.Endpoint],
3214
3565
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3215
3566
  )
3216
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3567
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3217
3568
  if g_param[OptionsDefine.Language]:
3218
3569
  profile.language = g_param[OptionsDefine.Language]
3219
3570
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3243,7 +3594,7 @@ def doDeleteLogstashPipelines(args, parsed_globals):
3243
3594
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3244
3595
 
3245
3596
 
3246
- def doExportIpTraceLog(args, parsed_globals):
3597
+ def doUpdateIpTraceStatus(args, parsed_globals):
3247
3598
  g_param = parse_global_arg(parsed_globals)
3248
3599
 
3249
3600
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3253,7 +3604,10 @@ def doExportIpTraceLog(args, parsed_globals):
3253
3604
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3254
3605
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3255
3606
  )
3256
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3607
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3609
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3610
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3257
3611
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3258
3612
  else:
3259
3613
  cred = credential.Credential(
@@ -3265,18 +3619,18 @@ def doExportIpTraceLog(args, parsed_globals):
3265
3619
  endpoint=g_param[OptionsDefine.Endpoint],
3266
3620
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3267
3621
  )
3268
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3622
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3269
3623
  if g_param[OptionsDefine.Language]:
3270
3624
  profile.language = g_param[OptionsDefine.Language]
3271
3625
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3272
3626
  client = mod.EsClient(cred, g_param[OptionsDefine.Region], profile)
3273
3627
  client._sdkVersion += ("_CLI_" + __version__)
3274
3628
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3275
- model = models.ExportIpTraceLogRequest()
3629
+ model = models.UpdateIpTraceStatusRequest()
3276
3630
  model.from_json_string(json.dumps(args))
3277
3631
  start_time = time.time()
3278
3632
  while True:
3279
- rsp = client.ExportIpTraceLog(model)
3633
+ rsp = client.UpdateIpTraceStatus(model)
3280
3634
  result = rsp.to_json_string()
3281
3635
  try:
3282
3636
  json_obj = json.loads(result)
@@ -3305,7 +3659,10 @@ def doUpgradeLicense(args, parsed_globals):
3305
3659
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3306
3660
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3307
3661
  )
3308
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3662
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3664
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3665
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3309
3666
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3310
3667
  else:
3311
3668
  cred = credential.Credential(
@@ -3317,7 +3674,7 @@ def doUpgradeLicense(args, parsed_globals):
3317
3674
  endpoint=g_param[OptionsDefine.Endpoint],
3318
3675
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3319
3676
  )
3320
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3677
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3321
3678
  if g_param[OptionsDefine.Language]:
3322
3679
  profile.language = g_param[OptionsDefine.Language]
3323
3680
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3357,7 +3714,10 @@ def doDescribeInstancePluginList(args, parsed_globals):
3357
3714
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3358
3715
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3359
3716
  )
3360
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3717
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3719
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3720
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3361
3721
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3362
3722
  else:
3363
3723
  cred = credential.Credential(
@@ -3369,7 +3729,7 @@ def doDescribeInstancePluginList(args, parsed_globals):
3369
3729
  endpoint=g_param[OptionsDefine.Endpoint],
3370
3730
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3371
3731
  )
3372
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3732
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3373
3733
  if g_param[OptionsDefine.Language]:
3374
3734
  profile.language = g_param[OptionsDefine.Language]
3375
3735
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3409,7 +3769,10 @@ def doDescribeServerlessInstances(args, parsed_globals):
3409
3769
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3410
3770
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3411
3771
  )
3412
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3772
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3774
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3775
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3413
3776
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3414
3777
  else:
3415
3778
  cred = credential.Credential(
@@ -3421,7 +3784,7 @@ def doDescribeServerlessInstances(args, parsed_globals):
3421
3784
  endpoint=g_param[OptionsDefine.Endpoint],
3422
3785
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3423
3786
  )
3424
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3787
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3425
3788
  if g_param[OptionsDefine.Language]:
3426
3789
  profile.language = g_param[OptionsDefine.Language]
3427
3790
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3461,7 +3824,10 @@ def doDescribeIndexMeta(args, parsed_globals):
3461
3824
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3462
3825
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3463
3826
  )
3464
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3829
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3830
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3465
3831
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3466
3832
  else:
3467
3833
  cred = credential.Credential(
@@ -3473,7 +3839,7 @@ def doDescribeIndexMeta(args, parsed_globals):
3473
3839
  endpoint=g_param[OptionsDefine.Endpoint],
3474
3840
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3475
3841
  )
3476
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3842
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3477
3843
  if g_param[OptionsDefine.Language]:
3478
3844
  profile.language = g_param[OptionsDefine.Language]
3479
3845
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3513,7 +3879,10 @@ def doChatCompletions(args, parsed_globals):
3513
3879
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3514
3880
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3515
3881
  )
3516
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3882
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3884
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3885
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3517
3886
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3518
3887
  else:
3519
3888
  cred = credential.Credential(
@@ -3525,7 +3894,7 @@ def doChatCompletions(args, parsed_globals):
3525
3894
  endpoint=g_param[OptionsDefine.Endpoint],
3526
3895
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3527
3896
  )
3528
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3897
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3529
3898
  if g_param[OptionsDefine.Language]:
3530
3899
  profile.language = g_param[OptionsDefine.Language]
3531
3900
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3565,7 +3934,10 @@ def doChunkDocument(args, parsed_globals):
3565
3934
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3566
3935
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3567
3936
  )
3568
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3937
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3939
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3940
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3569
3941
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3570
3942
  else:
3571
3943
  cred = credential.Credential(
@@ -3577,7 +3949,7 @@ def doChunkDocument(args, parsed_globals):
3577
3949
  endpoint=g_param[OptionsDefine.Endpoint],
3578
3950
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3579
3951
  )
3580
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3952
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3581
3953
  if g_param[OptionsDefine.Language]:
3582
3954
  profile.language = g_param[OptionsDefine.Language]
3583
3955
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3617,7 +3989,10 @@ def doGetMultiModalEmbedding(args, parsed_globals):
3617
3989
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3618
3990
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3619
3991
  )
3620
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3992
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3994
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3995
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3621
3996
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3622
3997
  else:
3623
3998
  cred = credential.Credential(
@@ -3629,7 +4004,7 @@ def doGetMultiModalEmbedding(args, parsed_globals):
3629
4004
  endpoint=g_param[OptionsDefine.Endpoint],
3630
4005
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3631
4006
  )
3632
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4007
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3633
4008
  if g_param[OptionsDefine.Language]:
3634
4009
  profile.language = g_param[OptionsDefine.Language]
3635
4010
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3669,7 +4044,10 @@ def doInquirePriceRenewInstance(args, parsed_globals):
3669
4044
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3670
4045
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3671
4046
  )
3672
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4047
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4049
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4050
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3673
4051
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3674
4052
  else:
3675
4053
  cred = credential.Credential(
@@ -3681,7 +4059,7 @@ def doInquirePriceRenewInstance(args, parsed_globals):
3681
4059
  endpoint=g_param[OptionsDefine.Endpoint],
3682
4060
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3683
4061
  )
3684
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4062
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3685
4063
  if g_param[OptionsDefine.Language]:
3686
4064
  profile.language = g_param[OptionsDefine.Language]
3687
4065
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3721,7 +4099,10 @@ def doCreateClusterSnapshot(args, parsed_globals):
3721
4099
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3722
4100
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3723
4101
  )
3724
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4102
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4104
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4105
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3725
4106
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3726
4107
  else:
3727
4108
  cred = credential.Credential(
@@ -3733,7 +4114,7 @@ def doCreateClusterSnapshot(args, parsed_globals):
3733
4114
  endpoint=g_param[OptionsDefine.Endpoint],
3734
4115
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3735
4116
  )
3736
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4117
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3737
4118
  if g_param[OptionsDefine.Language]:
3738
4119
  profile.language = g_param[OptionsDefine.Language]
3739
4120
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3782,6 +4163,7 @@ ACTION_MAP = {
3782
4163
  "GetRequestTargetNodeTypes": doGetRequestTargetNodeTypes,
3783
4164
  "StopLogstashPipelines": doStopLogstashPipelines,
3784
4165
  "DescribeServerlessSpaces": doDescribeServerlessSpaces,
4166
+ "ExportIpTraceLog": doExportIpTraceLog,
3785
4167
  "InstallInstanceModel": doInstallInstanceModel,
3786
4168
  "DescribeIndexList": doDescribeIndexList,
3787
4169
  "DescribeInstanceOperations": doDescribeInstanceOperations,
@@ -3802,6 +4184,7 @@ ACTION_MAP = {
3802
4184
  "DescribeClusterSnapshot": doDescribeClusterSnapshot,
3803
4185
  "CreateLogstashInstance": doCreateLogstashInstance,
3804
4186
  "RestartInstance": doRestartInstance,
4187
+ "GetIpTraceStatus": doGetIpTraceStatus,
3805
4188
  "UpdateInstance": doUpdateInstance,
3806
4189
  "DescribeInstanceLogs": doDescribeInstanceLogs,
3807
4190
  "RestartKibana": doRestartKibana,
@@ -3817,7 +4200,7 @@ ACTION_MAP = {
3817
4200
  "ModifyEsVipSecurityGroup": doModifyEsVipSecurityGroup,
3818
4201
  "CreateInstance": doCreateInstance,
3819
4202
  "UpdateServerlessInstance": doUpdateServerlessInstance,
3820
- "RestartLogstashInstance": doRestartLogstashInstance,
4203
+ "QueryIpTraceLog": doQueryIpTraceLog,
3821
4204
  "GetTextEmbedding": doGetTextEmbedding,
3822
4205
  "DescribeDiagnose": doDescribeDiagnose,
3823
4206
  "ParseDocument": doParseDocument,
@@ -3835,10 +4218,11 @@ ACTION_MAP = {
3835
4218
  "RestartNodes": doRestartNodes,
3836
4219
  "ParseDocumentAsync": doParseDocumentAsync,
3837
4220
  "DescribeServerlessSpaceUser": doDescribeServerlessSpaceUser,
4221
+ "RestartLogstashInstance": doRestartLogstashInstance,
3838
4222
  "DeleteIndex": doDeleteIndex,
3839
4223
  "SaveAndDeployLogstashPipeline": doSaveAndDeployLogstashPipeline,
3840
4224
  "DeleteLogstashPipelines": doDeleteLogstashPipelines,
3841
- "ExportIpTraceLog": doExportIpTraceLog,
4225
+ "UpdateIpTraceStatus": doUpdateIpTraceStatus,
3842
4226
  "UpgradeLicense": doUpgradeLicense,
3843
4227
  "DescribeInstancePluginList": doDescribeInstancePluginList,
3844
4228
  "DescribeServerlessInstances": doDescribeServerlessInstances,