tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/bma/bma_client.py
CHANGED
|
@@ -29,7 +29,10 @@ def doDescribeBPProtectURLs(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -41,7 +44,7 @@ def doDescribeBPProtectURLs(args, parsed_globals):
|
|
|
41
44
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
42
45
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
43
46
|
)
|
|
44
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
47
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
45
48
|
if g_param[OptionsDefine.Language]:
|
|
46
49
|
profile.language = g_param[OptionsDefine.Language]
|
|
47
50
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -81,7 +84,10 @@ def doDeleteBPWhiteList(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -93,7 +99,7 @@ def doDeleteBPWhiteList(args, parsed_globals):
|
|
|
93
99
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
94
100
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
95
101
|
)
|
|
96
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
102
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
97
103
|
if g_param[OptionsDefine.Language]:
|
|
98
104
|
profile.language = g_param[OptionsDefine.Language]
|
|
99
105
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -133,7 +139,10 @@ def doUpdateCRWork(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -145,7 +154,7 @@ def doUpdateCRWork(args, parsed_globals):
|
|
|
145
154
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
146
155
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
147
156
|
)
|
|
148
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
157
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
149
158
|
if g_param[OptionsDefine.Language]:
|
|
150
159
|
profile.language = g_param[OptionsDefine.Language]
|
|
151
160
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -185,7 +194,10 @@ def doDescribeBPCompanyInfo(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -197,7 +209,7 @@ def doDescribeBPCompanyInfo(args, parsed_globals):
|
|
|
197
209
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
198
210
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
199
211
|
)
|
|
200
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
212
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
201
213
|
if g_param[OptionsDefine.Language]:
|
|
202
214
|
profile.language = g_param[OptionsDefine.Language]
|
|
203
215
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -237,7 +249,10 @@ def doCreateCRBlock(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -249,7 +264,7 @@ def doCreateCRBlock(args, parsed_globals):
|
|
|
249
264
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
250
265
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
251
266
|
)
|
|
252
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
267
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
253
268
|
if g_param[OptionsDefine.Language]:
|
|
254
269
|
profile.language = g_param[OptionsDefine.Language]
|
|
255
270
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -289,7 +304,10 @@ def doCreateCRWork(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -301,7 +319,7 @@ def doCreateCRWork(args, parsed_globals):
|
|
|
301
319
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
302
320
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
303
321
|
)
|
|
304
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
322
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
305
323
|
if g_param[OptionsDefine.Language]:
|
|
306
324
|
profile.language = g_param[OptionsDefine.Language]
|
|
307
325
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -341,7 +359,10 @@ def doCreateBPOfflineTicket(args, parsed_globals):
|
|
|
341
359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
361
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
367
|
else:
|
|
347
368
|
cred = credential.Credential(
|
|
@@ -353,7 +374,7 @@ def doCreateBPOfflineTicket(args, parsed_globals):
|
|
|
353
374
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
354
375
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
355
376
|
)
|
|
356
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
377
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
357
378
|
if g_param[OptionsDefine.Language]:
|
|
358
379
|
profile.language = g_param[OptionsDefine.Language]
|
|
359
380
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -393,7 +414,10 @@ def doCreateBPOfflineAttachment(args, parsed_globals):
|
|
|
393
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
416
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
422
|
else:
|
|
399
423
|
cred = credential.Credential(
|
|
@@ -405,7 +429,7 @@ def doCreateBPOfflineAttachment(args, parsed_globals):
|
|
|
405
429
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
406
430
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
407
431
|
)
|
|
408
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
432
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
409
433
|
if g_param[OptionsDefine.Language]:
|
|
410
434
|
profile.language = g_param[OptionsDefine.Language]
|
|
411
435
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -445,7 +469,10 @@ def doDescribeCRObtainDetail(args, parsed_globals):
|
|
|
445
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
471
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
477
|
else:
|
|
451
478
|
cred = credential.Credential(
|
|
@@ -457,7 +484,7 @@ def doDescribeCRObtainDetail(args, parsed_globals):
|
|
|
457
484
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
458
485
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
459
486
|
)
|
|
460
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
487
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
461
488
|
if g_param[OptionsDefine.Language]:
|
|
462
489
|
profile.language = g_param[OptionsDefine.Language]
|
|
463
490
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -497,7 +524,10 @@ def doCreateCRUserVerify(args, parsed_globals):
|
|
|
497
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
526
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
532
|
else:
|
|
503
533
|
cred = credential.Credential(
|
|
@@ -509,7 +539,7 @@ def doCreateCRUserVerify(args, parsed_globals):
|
|
|
509
539
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
510
540
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
511
541
|
)
|
|
512
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
542
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
513
543
|
if g_param[OptionsDefine.Language]:
|
|
514
544
|
profile.language = g_param[OptionsDefine.Language]
|
|
515
545
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -549,7 +579,10 @@ def doModifyCRObtainStatus(args, parsed_globals):
|
|
|
549
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
581
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
587
|
else:
|
|
555
588
|
cred = credential.Credential(
|
|
@@ -561,7 +594,7 @@ def doModifyCRObtainStatus(args, parsed_globals):
|
|
|
561
594
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
562
595
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
563
596
|
)
|
|
564
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
597
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
565
598
|
if g_param[OptionsDefine.Language]:
|
|
566
599
|
profile.language = g_param[OptionsDefine.Language]
|
|
567
600
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -601,7 +634,10 @@ def doCreateCRRight(args, parsed_globals):
|
|
|
601
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
636
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
642
|
else:
|
|
607
643
|
cred = credential.Credential(
|
|
@@ -613,7 +649,7 @@ def doCreateCRRight(args, parsed_globals):
|
|
|
613
649
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
614
650
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
615
651
|
)
|
|
616
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
652
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
617
653
|
if g_param[OptionsDefine.Language]:
|
|
618
654
|
profile.language = g_param[OptionsDefine.Language]
|
|
619
655
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -653,7 +689,10 @@ def doModifyBPOfflineAttachment(args, parsed_globals):
|
|
|
653
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
691
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
697
|
else:
|
|
659
698
|
cred = credential.Credential(
|
|
@@ -665,7 +704,7 @@ def doModifyBPOfflineAttachment(args, parsed_globals):
|
|
|
665
704
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
666
705
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
667
706
|
)
|
|
668
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
707
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
669
708
|
if g_param[OptionsDefine.Language]:
|
|
670
709
|
profile.language = g_param[OptionsDefine.Language]
|
|
671
710
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -705,7 +744,10 @@ def doCreateBPFakeURLs(args, parsed_globals):
|
|
|
705
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
746
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
752
|
else:
|
|
711
753
|
cred = credential.Credential(
|
|
@@ -717,7 +759,7 @@ def doCreateBPFakeURLs(args, parsed_globals):
|
|
|
717
759
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
718
760
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
719
761
|
)
|
|
720
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
762
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
721
763
|
if g_param[OptionsDefine.Language]:
|
|
722
764
|
profile.language = g_param[OptionsDefine.Language]
|
|
723
765
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -757,7 +799,10 @@ def doCreateBPBrand(args, parsed_globals):
|
|
|
757
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
801
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
807
|
else:
|
|
763
808
|
cred = credential.Credential(
|
|
@@ -769,7 +814,7 @@ def doCreateBPBrand(args, parsed_globals):
|
|
|
769
814
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
770
815
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
771
816
|
)
|
|
772
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
817
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
773
818
|
if g_param[OptionsDefine.Language]:
|
|
774
819
|
profile.language = g_param[OptionsDefine.Language]
|
|
775
820
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -809,7 +854,10 @@ def doDescribeBPBrands(args, parsed_globals):
|
|
|
809
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
856
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
862
|
else:
|
|
815
863
|
cred = credential.Credential(
|
|
@@ -821,7 +869,7 @@ def doDescribeBPBrands(args, parsed_globals):
|
|
|
821
869
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
822
870
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
823
871
|
)
|
|
824
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
872
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
825
873
|
if g_param[OptionsDefine.Language]:
|
|
826
874
|
profile.language = g_param[OptionsDefine.Language]
|
|
827
875
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -861,7 +909,10 @@ def doModifyCRMonitor(args, parsed_globals):
|
|
|
861
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
911
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
917
|
else:
|
|
867
918
|
cred = credential.Credential(
|
|
@@ -873,7 +924,7 @@ def doModifyCRMonitor(args, parsed_globals):
|
|
|
873
924
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
874
925
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
875
926
|
)
|
|
876
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
877
928
|
if g_param[OptionsDefine.Language]:
|
|
878
929
|
profile.language = g_param[OptionsDefine.Language]
|
|
879
930
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -913,7 +964,10 @@ def doDescribeCRMonitorDetail(args, parsed_globals):
|
|
|
913
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
966
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
972
|
else:
|
|
919
973
|
cred = credential.Credential(
|
|
@@ -925,7 +979,7 @@ def doDescribeCRMonitorDetail(args, parsed_globals):
|
|
|
925
979
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
926
980
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
927
981
|
)
|
|
928
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
929
983
|
if g_param[OptionsDefine.Language]:
|
|
930
984
|
profile.language = g_param[OptionsDefine.Language]
|
|
931
985
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -965,7 +1019,10 @@ def doCreateBPFakeURL(args, parsed_globals):
|
|
|
965
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1021
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1027
|
else:
|
|
971
1028
|
cred = credential.Credential(
|
|
@@ -977,7 +1034,7 @@ def doCreateBPFakeURL(args, parsed_globals):
|
|
|
977
1034
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
978
1035
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
979
1036
|
)
|
|
980
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1037
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
981
1038
|
if g_param[OptionsDefine.Language]:
|
|
982
1039
|
profile.language = g_param[OptionsDefine.Language]
|
|
983
1040
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1017,7 +1074,10 @@ def doCreateCRRightFile(args, parsed_globals):
|
|
|
1017
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1076
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1082
|
else:
|
|
1023
1083
|
cred = credential.Credential(
|
|
@@ -1029,7 +1089,7 @@ def doCreateCRRightFile(args, parsed_globals):
|
|
|
1029
1089
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1030
1090
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1031
1091
|
)
|
|
1032
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1092
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1033
1093
|
if g_param[OptionsDefine.Language]:
|
|
1034
1094
|
profile.language = g_param[OptionsDefine.Language]
|
|
1035
1095
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1069,7 +1129,10 @@ def doModifyCRWhiteList(args, parsed_globals):
|
|
|
1069
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1131
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1137
|
else:
|
|
1075
1138
|
cred = credential.Credential(
|
|
@@ -1081,7 +1144,7 @@ def doModifyCRWhiteList(args, parsed_globals):
|
|
|
1081
1144
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1082
1145
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1083
1146
|
)
|
|
1084
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1147
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1085
1148
|
if g_param[OptionsDefine.Language]:
|
|
1086
1149
|
profile.language = g_param[OptionsDefine.Language]
|
|
1087
1150
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1121,7 +1184,10 @@ def doModifyCRBlockStatus(args, parsed_globals):
|
|
|
1121
1184
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1185
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1186
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1192
|
else:
|
|
1127
1193
|
cred = credential.Credential(
|
|
@@ -1133,7 +1199,7 @@ def doModifyCRBlockStatus(args, parsed_globals):
|
|
|
1133
1199
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1134
1200
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1135
1201
|
)
|
|
1136
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1202
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1137
1203
|
if g_param[OptionsDefine.Language]:
|
|
1138
1204
|
profile.language = g_param[OptionsDefine.Language]
|
|
1139
1205
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1173,7 +1239,10 @@ def doCreateBPWhiteList(args, parsed_globals):
|
|
|
1173
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1241
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1247
|
else:
|
|
1179
1248
|
cred = credential.Credential(
|
|
@@ -1185,7 +1254,7 @@ def doCreateBPWhiteList(args, parsed_globals):
|
|
|
1185
1254
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1186
1255
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1187
1256
|
)
|
|
1188
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1257
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1189
1258
|
if g_param[OptionsDefine.Language]:
|
|
1190
1259
|
profile.language = g_param[OptionsDefine.Language]
|
|
1191
1260
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1225,7 +1294,10 @@ def doCreateBPFalseTicket(args, parsed_globals):
|
|
|
1225
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1296
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1302
|
else:
|
|
1231
1303
|
cred = credential.Credential(
|
|
@@ -1237,7 +1309,7 @@ def doCreateBPFalseTicket(args, parsed_globals):
|
|
|
1237
1309
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1238
1310
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1239
1311
|
)
|
|
1240
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1312
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1241
1313
|
if g_param[OptionsDefine.Language]:
|
|
1242
1314
|
profile.language = g_param[OptionsDefine.Language]
|
|
1243
1315
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1277,7 +1349,10 @@ def doCreateBPProtectURLs(args, parsed_globals):
|
|
|
1277
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1351
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1357
|
else:
|
|
1283
1358
|
cred = credential.Credential(
|
|
@@ -1289,7 +1364,7 @@ def doCreateBPProtectURLs(args, parsed_globals):
|
|
|
1289
1364
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1290
1365
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1291
1366
|
)
|
|
1292
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1367
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1293
1368
|
if g_param[OptionsDefine.Language]:
|
|
1294
1369
|
profile.language = g_param[OptionsDefine.Language]
|
|
1295
1370
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1329,7 +1404,10 @@ def doCreateCRTort(args, parsed_globals):
|
|
|
1329
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1406
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1412
|
else:
|
|
1335
1413
|
cred = credential.Credential(
|
|
@@ -1341,7 +1419,7 @@ def doCreateCRTort(args, parsed_globals):
|
|
|
1341
1419
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1342
1420
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1343
1421
|
)
|
|
1344
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1422
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1345
1423
|
if g_param[OptionsDefine.Language]:
|
|
1346
1424
|
profile.language = g_param[OptionsDefine.Language]
|
|
1347
1425
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1381,7 +1459,10 @@ def doDescribeBPFakeURLs(args, parsed_globals):
|
|
|
1381
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1461
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1467
|
else:
|
|
1387
1468
|
cred = credential.Credential(
|
|
@@ -1393,7 +1474,7 @@ def doDescribeBPFakeURLs(args, parsed_globals):
|
|
|
1393
1474
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1394
1475
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1395
1476
|
)
|
|
1396
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1477
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1397
1478
|
if g_param[OptionsDefine.Language]:
|
|
1398
1479
|
profile.language = g_param[OptionsDefine.Language]
|
|
1399
1480
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1433,7 +1514,10 @@ def doDescribeCRWorkInfo(args, parsed_globals):
|
|
|
1433
1514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1516
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1522
|
else:
|
|
1439
1523
|
cred = credential.Credential(
|
|
@@ -1445,7 +1529,7 @@ def doDescribeCRWorkInfo(args, parsed_globals):
|
|
|
1445
1529
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1446
1530
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1447
1531
|
)
|
|
1448
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1532
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1449
1533
|
if g_param[OptionsDefine.Language]:
|
|
1450
1534
|
profile.language = g_param[OptionsDefine.Language]
|
|
1451
1535
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1485,7 +1569,10 @@ def doCreateBPFakeAPP(args, parsed_globals):
|
|
|
1485
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1571
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1577
|
else:
|
|
1491
1578
|
cred = credential.Credential(
|
|
@@ -1497,7 +1584,7 @@ def doCreateBPFakeAPP(args, parsed_globals):
|
|
|
1497
1584
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1498
1585
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1499
1586
|
)
|
|
1500
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1587
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1501
1588
|
if g_param[OptionsDefine.Language]:
|
|
1502
1589
|
profile.language = g_param[OptionsDefine.Language]
|
|
1503
1590
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1537,7 +1624,10 @@ def doDescribeCRMonitors(args, parsed_globals):
|
|
|
1537
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1626
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1632
|
else:
|
|
1543
1633
|
cred = credential.Credential(
|
|
@@ -1549,7 +1639,7 @@ def doDescribeCRMonitors(args, parsed_globals):
|
|
|
1549
1639
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1550
1640
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1551
1641
|
)
|
|
1552
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1642
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1553
1643
|
if g_param[OptionsDefine.Language]:
|
|
1554
1644
|
profile.language = g_param[OptionsDefine.Language]
|
|
1555
1645
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1589,7 +1679,10 @@ def doModifyCRRightStatus(args, parsed_globals):
|
|
|
1589
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1681
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1687
|
else:
|
|
1595
1688
|
cred = credential.Credential(
|
|
@@ -1601,7 +1694,7 @@ def doModifyCRRightStatus(args, parsed_globals):
|
|
|
1601
1694
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1602
1695
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1603
1696
|
)
|
|
1604
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1697
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1605
1698
|
if g_param[OptionsDefine.Language]:
|
|
1606
1699
|
profile.language = g_param[OptionsDefine.Language]
|
|
1607
1700
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1641,7 +1734,10 @@ def doCreateCRDesktopCode(args, parsed_globals):
|
|
|
1641
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1736
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1742
|
else:
|
|
1647
1743
|
cred = credential.Credential(
|
|
@@ -1653,7 +1749,7 @@ def doCreateCRDesktopCode(args, parsed_globals):
|
|
|
1653
1749
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1654
1750
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1655
1751
|
)
|
|
1656
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1752
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1657
1753
|
if g_param[OptionsDefine.Language]:
|
|
1658
1754
|
profile.language = g_param[OptionsDefine.Language]
|
|
1659
1755
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1693,7 +1789,10 @@ def doDescribeBPWhiteLists(args, parsed_globals):
|
|
|
1693
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1791
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1797
|
else:
|
|
1699
1798
|
cred = credential.Credential(
|
|
@@ -1705,7 +1804,7 @@ def doDescribeBPWhiteLists(args, parsed_globals):
|
|
|
1705
1804
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1706
1805
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1707
1806
|
)
|
|
1708
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1807
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1709
1808
|
if g_param[OptionsDefine.Language]:
|
|
1710
1809
|
profile.language = g_param[OptionsDefine.Language]
|
|
1711
1810
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1745,7 +1844,10 @@ def doDescribeBPReportFakeURLs(args, parsed_globals):
|
|
|
1745
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1846
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1852
|
else:
|
|
1751
1853
|
cred = credential.Credential(
|
|
@@ -1757,7 +1859,7 @@ def doDescribeBPReportFakeURLs(args, parsed_globals):
|
|
|
1757
1859
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1758
1860
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1759
1861
|
)
|
|
1760
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1862
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1761
1863
|
if g_param[OptionsDefine.Language]:
|
|
1762
1864
|
profile.language = g_param[OptionsDefine.Language]
|
|
1763
1865
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1797,7 +1899,10 @@ def doCreateBPFakeAPPList(args, parsed_globals):
|
|
|
1797
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
1901
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
1907
|
else:
|
|
1803
1908
|
cred = credential.Credential(
|
|
@@ -1809,7 +1914,7 @@ def doCreateBPFakeAPPList(args, parsed_globals):
|
|
|
1809
1914
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1810
1915
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1811
1916
|
)
|
|
1812
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1917
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1813
1918
|
if g_param[OptionsDefine.Language]:
|
|
1814
1919
|
profile.language = g_param[OptionsDefine.Language]
|
|
1815
1920
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1849,7 +1954,10 @@ def doDescribeBPFakeAPPList(args, parsed_globals):
|
|
|
1849
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
1956
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
1962
|
else:
|
|
1855
1963
|
cred = credential.Credential(
|
|
@@ -1861,7 +1969,7 @@ def doDescribeBPFakeAPPList(args, parsed_globals):
|
|
|
1861
1969
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1862
1970
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1863
1971
|
)
|
|
1864
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1972
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1865
1973
|
if g_param[OptionsDefine.Language]:
|
|
1866
1974
|
profile.language = g_param[OptionsDefine.Language]
|
|
1867
1975
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1901,7 +2009,10 @@ def doCreateCRCompanyVerify(args, parsed_globals):
|
|
|
1901
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2011
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2017
|
else:
|
|
1907
2018
|
cred = credential.Credential(
|
|
@@ -1913,7 +2024,7 @@ def doCreateCRCompanyVerify(args, parsed_globals):
|
|
|
1913
2024
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1914
2025
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1915
2026
|
)
|
|
1916
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2027
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1917
2028
|
if g_param[OptionsDefine.Language]:
|
|
1918
2029
|
profile.language = g_param[OptionsDefine.Language]
|
|
1919
2030
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|