tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/cdb/cdb_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doDescribeDBInstanceGTID(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDescribeDBInstanceGTID(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doCreateRoInstanceIp(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doCreateRoInstanceIp(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doCreateAuditPolicy(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doCreateAuditPolicy(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doDescribeTableColumns(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doDescribeTableColumns(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doDescribeDBInstanceLogToCLS(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doDescribeDBInstanceLogToCLS(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doDescribeDBFeatures(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doDescribeDBFeatures(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doCreateAuditRuleTemplate(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doCreateAuditRuleTemplate(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doBalanceRoGroupLoad(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doBalanceRoGroupLoad(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doIsolateDBInstance(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doIsolateDBInstance(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +522,10 @@ def doModifyRoGroupVipVport(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,7 +537,7 @@ def doModifyRoGroupVipVport(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +577,10 @@ def doDescribeRoGroups(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,7 +592,7 @@ def doDescribeRoGroups(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +632,10 @@ def doDescribeAccounts(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,7 +647,7 @@ def doDescribeAccounts(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +687,10 @@ def doModifyInstanceTag(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,7 +702,7 @@ def doModifyInstanceTag(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +742,10 @@ def doDescribeTimeWindow(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,7 +757,7 @@ def doDescribeTimeWindow(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +797,10 @@ def doDescribeInstanceUpgradeCheckJob(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,7 +812,7 @@ def doDescribeInstanceUpgradeCheckJob(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +852,10 @@ def doDescribeBackupOverview(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,7 +867,7 @@ def doDescribeBackupOverview(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +907,10 @@ def doStopReplication(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,7 +922,7 @@ def doStopReplication(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +962,10 @@ def doModifyDBInstanceLogToCLS(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,7 +977,7 @@ def doModifyDBInstanceLogToCLS(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1017,10 @@ def doStopCpuExpand(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,7 +1032,7 @@ def doStopCpuExpand(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1072,10 @@ def doModifyDBInstanceName(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,7 +1087,7 @@ def doModifyDBInstanceName(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1127,10 @@ def doDescribeCdbZoneConfig(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,7 +1142,7 @@ def doDescribeCdbZoneConfig(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1119,7 +1182,10 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
1119
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1184
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1190
|
else:
|
|
1125
1191
|
cred = credential.Credential(
|
|
@@ -1131,7 +1197,7 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
1131
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1199
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1201
|
if g_param[OptionsDefine.Language]:
|
|
1136
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1237,10 @@ def doStopRollback(args, parsed_globals):
|
|
|
1171
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1239
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1245
|
else:
|
|
1177
1246
|
cred = credential.Credential(
|
|
@@ -1183,7 +1252,7 @@ def doStopRollback(args, parsed_globals):
|
|
|
1183
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1254
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1256
|
if g_param[OptionsDefine.Language]:
|
|
1188
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1292,10 @@ def doDescribeInstanceUpgradeType(args, parsed_globals):
|
|
|
1223
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1294
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1300
|
else:
|
|
1229
1301
|
cred = credential.Credential(
|
|
@@ -1235,7 +1307,7 @@ def doDescribeInstanceUpgradeType(args, parsed_globals):
|
|
|
1235
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1309
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1311
|
if g_param[OptionsDefine.Language]:
|
|
1240
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1347,10 @@ def doOfflineIsolatedInstances(args, parsed_globals):
|
|
|
1275
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1349
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1355
|
else:
|
|
1281
1356
|
cred = credential.Credential(
|
|
@@ -1287,7 +1362,7 @@ def doOfflineIsolatedInstances(args, parsed_globals):
|
|
|
1287
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1364
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1366
|
if g_param[OptionsDefine.Language]:
|
|
1292
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1402,10 @@ def doCreateAuditLogFile(args, parsed_globals):
|
|
|
1327
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1404
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1410
|
else:
|
|
1333
1411
|
cred = credential.Credential(
|
|
@@ -1339,7 +1417,7 @@ def doCreateAuditLogFile(args, parsed_globals):
|
|
|
1339
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1419
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1421
|
if g_param[OptionsDefine.Language]:
|
|
1344
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1457,10 @@ def doOpenDBInstanceGTID(args, parsed_globals):
|
|
|
1379
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1459
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1465
|
else:
|
|
1385
1466
|
cred = credential.Credential(
|
|
@@ -1391,7 +1472,7 @@ def doOpenDBInstanceGTID(args, parsed_globals):
|
|
|
1391
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1474
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1476
|
if g_param[OptionsDefine.Language]:
|
|
1396
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1512,10 @@ def doDescribeRollbackTaskDetail(args, parsed_globals):
|
|
|
1431
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1514
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1520
|
else:
|
|
1437
1521
|
cred = credential.Credential(
|
|
@@ -1443,7 +1527,7 @@ def doDescribeRollbackTaskDetail(args, parsed_globals):
|
|
|
1443
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1529
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1531
|
if g_param[OptionsDefine.Language]:
|
|
1448
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1567,10 @@ def doCheckMigrateCluster(args, parsed_globals):
|
|
|
1483
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1569
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1575
|
else:
|
|
1489
1576
|
cred = credential.Credential(
|
|
@@ -1495,7 +1582,7 @@ def doCheckMigrateCluster(args, parsed_globals):
|
|
|
1495
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1584
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1586
|
if g_param[OptionsDefine.Language]:
|
|
1500
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1622,10 @@ def doModifyBackupDownloadRestriction(args, parsed_globals):
|
|
|
1535
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1624
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1630
|
else:
|
|
1541
1631
|
cred = credential.Credential(
|
|
@@ -1547,7 +1637,7 @@ def doModifyBackupDownloadRestriction(args, parsed_globals):
|
|
|
1547
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1639
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1641
|
if g_param[OptionsDefine.Language]:
|
|
1552
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1677,10 @@ def doCloseCdbProxyAddress(args, parsed_globals):
|
|
|
1587
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1679
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1685
|
else:
|
|
1593
1686
|
cred = credential.Credential(
|
|
@@ -1599,7 +1692,7 @@ def doCloseCdbProxyAddress(args, parsed_globals):
|
|
|
1599
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1694
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1696
|
if g_param[OptionsDefine.Language]:
|
|
1604
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1732,10 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
1639
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1734
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1740
|
else:
|
|
1645
1741
|
cred = credential.Credential(
|
|
@@ -1651,7 +1747,7 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
1651
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1749
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1751
|
if g_param[OptionsDefine.Language]:
|
|
1656
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1787,10 @@ def doDescribeBackupConfig(args, parsed_globals):
|
|
|
1691
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1789
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1795
|
else:
|
|
1697
1796
|
cred = credential.Credential(
|
|
@@ -1703,7 +1802,7 @@ def doDescribeBackupConfig(args, parsed_globals):
|
|
|
1703
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1804
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1806
|
if g_param[OptionsDefine.Language]:
|
|
1708
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +1842,10 @@ def doOpenDBInstanceEncryption(args, parsed_globals):
|
|
|
1743
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1844
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1850
|
else:
|
|
1749
1851
|
cred = credential.Credential(
|
|
@@ -1755,7 +1857,7 @@ def doOpenDBInstanceEncryption(args, parsed_globals):
|
|
|
1755
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1859
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1861
|
if g_param[OptionsDefine.Language]:
|
|
1760
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +1897,10 @@ def doCloseWanService(args, parsed_globals):
|
|
|
1795
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1899
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1905
|
else:
|
|
1801
1906
|
cred = credential.Credential(
|
|
@@ -1807,7 +1912,7 @@ def doCloseWanService(args, parsed_globals):
|
|
|
1807
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1914
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1916
|
if g_param[OptionsDefine.Language]:
|
|
1812
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +1952,10 @@ def doDescribeDefaultParams(args, parsed_globals):
|
|
|
1847
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
1954
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
1960
|
else:
|
|
1853
1961
|
cred = credential.Credential(
|
|
@@ -1859,7 +1967,7 @@ def doDescribeDefaultParams(args, parsed_globals):
|
|
|
1859
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
1969
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
1971
|
if g_param[OptionsDefine.Language]:
|
|
1864
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2007,10 @@ def doDescribeAuditPolicies(args, parsed_globals):
|
|
|
1899
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2009
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2015
|
else:
|
|
1905
2016
|
cred = credential.Credential(
|
|
@@ -1911,7 +2022,7 @@ def doDescribeAuditPolicies(args, parsed_globals):
|
|
|
1911
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2024
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2026
|
if g_param[OptionsDefine.Language]:
|
|
1916
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +2062,10 @@ def doDeleteDatabase(args, parsed_globals):
|
|
|
1951
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2064
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2070
|
else:
|
|
1957
2071
|
cred = credential.Credential(
|
|
@@ -1963,7 +2077,7 @@ def doDeleteDatabase(args, parsed_globals):
|
|
|
1963
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2079
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2081
|
if g_param[OptionsDefine.Language]:
|
|
1968
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2117,10 @@ def doDescribeTagsOfInstanceIds(args, parsed_globals):
|
|
|
2003
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2119
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2125
|
else:
|
|
2009
2126
|
cred = credential.Credential(
|
|
@@ -2015,7 +2132,7 @@ def doDescribeTagsOfInstanceIds(args, parsed_globals):
|
|
|
2015
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2134
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2136
|
if g_param[OptionsDefine.Language]:
|
|
2020
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2172,10 @@ def doDescribeDatabases(args, parsed_globals):
|
|
|
2055
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2174
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2180
|
else:
|
|
2061
2181
|
cred = credential.Credential(
|
|
@@ -2067,7 +2187,7 @@ def doDescribeDatabases(args, parsed_globals):
|
|
|
2067
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2189
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2191
|
if g_param[OptionsDefine.Language]:
|
|
2072
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2227,10 @@ def doDescribeErrorLogData(args, parsed_globals):
|
|
|
2107
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2229
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2235
|
else:
|
|
2113
2236
|
cred = credential.Credential(
|
|
@@ -2119,7 +2242,7 @@ def doDescribeErrorLogData(args, parsed_globals):
|
|
|
2119
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2244
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2246
|
if g_param[OptionsDefine.Language]:
|
|
2124
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2282,10 @@ def doSwitchDBInstanceMasterSlave(args, parsed_globals):
|
|
|
2159
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2284
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2290
|
else:
|
|
2165
2291
|
cred = credential.Credential(
|
|
@@ -2171,7 +2297,7 @@ def doSwitchDBInstanceMasterSlave(args, parsed_globals):
|
|
|
2171
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2299
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2301
|
if g_param[OptionsDefine.Language]:
|
|
2176
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2337,10 @@ def doCreateDatabase(args, parsed_globals):
|
|
|
2211
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2339
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2345
|
else:
|
|
2217
2346
|
cred = credential.Credential(
|
|
@@ -2223,7 +2352,7 @@ def doCreateDatabase(args, parsed_globals):
|
|
|
2223
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2354
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2356
|
if g_param[OptionsDefine.Language]:
|
|
2228
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2392,10 @@ def doDescribeCPUExpandStrategyInfo(args, parsed_globals):
|
|
|
2263
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2394
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2400
|
else:
|
|
2269
2401
|
cred = credential.Credential(
|
|
@@ -2275,7 +2407,7 @@ def doDescribeCPUExpandStrategyInfo(args, parsed_globals):
|
|
|
2275
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2409
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2411
|
if g_param[OptionsDefine.Language]:
|
|
2280
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2447,10 @@ def doDisassociateSecurityGroups(args, parsed_globals):
|
|
|
2315
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2449
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2455
|
else:
|
|
2321
2456
|
cred = credential.Credential(
|
|
@@ -2327,7 +2462,7 @@ def doDisassociateSecurityGroups(args, parsed_globals):
|
|
|
2327
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2464
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2466
|
if g_param[OptionsDefine.Language]:
|
|
2332
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2502,10 @@ def doModifyCdbProxyParam(args, parsed_globals):
|
|
|
2367
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2504
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2510
|
else:
|
|
2373
2511
|
cred = credential.Credential(
|
|
@@ -2379,7 +2517,7 @@ def doModifyCdbProxyParam(args, parsed_globals):
|
|
|
2379
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2519
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2521
|
if g_param[OptionsDefine.Language]:
|
|
2384
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2557,10 @@ def doDescribeTables(args, parsed_globals):
|
|
|
2419
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2559
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2565
|
else:
|
|
2425
2566
|
cred = credential.Credential(
|
|
@@ -2431,7 +2572,7 @@ def doDescribeTables(args, parsed_globals):
|
|
|
2431
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2574
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2576
|
if g_param[OptionsDefine.Language]:
|
|
2436
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2612,10 @@ def doDeleteTimeWindow(args, parsed_globals):
|
|
|
2471
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2614
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2620
|
else:
|
|
2477
2621
|
cred = credential.Credential(
|
|
@@ -2483,7 +2627,7 @@ def doDeleteTimeWindow(args, parsed_globals):
|
|
|
2483
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2629
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2631
|
if g_param[OptionsDefine.Language]:
|
|
2488
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2667,10 @@ def doDescribeAccountPrivileges(args, parsed_globals):
|
|
|
2523
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2669
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2675
|
else:
|
|
2529
2676
|
cred = credential.Credential(
|
|
@@ -2535,7 +2682,7 @@ def doDescribeAccountPrivileges(args, parsed_globals):
|
|
|
2535
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2684
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2686
|
if g_param[OptionsDefine.Language]:
|
|
2540
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2722,10 @@ def doDescribeDataBackupOverview(args, parsed_globals):
|
|
|
2575
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2724
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2730
|
else:
|
|
2581
2731
|
cred = credential.Credential(
|
|
@@ -2587,7 +2737,7 @@ def doDescribeDataBackupOverview(args, parsed_globals):
|
|
|
2587
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2739
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2741
|
if g_param[OptionsDefine.Language]:
|
|
2592
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2777,10 @@ def doReleaseIsolatedDBInstances(args, parsed_globals):
|
|
|
2627
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2779
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2785
|
else:
|
|
2633
2786
|
cred = credential.Credential(
|
|
@@ -2639,7 +2792,7 @@ def doReleaseIsolatedDBInstances(args, parsed_globals):
|
|
|
2639
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2794
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2796
|
if g_param[OptionsDefine.Language]:
|
|
2644
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2832,10 @@ def doCreateCloneInstance(args, parsed_globals):
|
|
|
2679
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2834
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2840
|
else:
|
|
2685
2841
|
cred = credential.Credential(
|
|
@@ -2691,7 +2847,7 @@ def doCreateCloneInstance(args, parsed_globals):
|
|
|
2691
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2849
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2851
|
if g_param[OptionsDefine.Language]:
|
|
2696
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +2887,10 @@ def doModifyAuditConfig(args, parsed_globals):
|
|
|
2731
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2889
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2895
|
else:
|
|
2737
2896
|
cred = credential.Credential(
|
|
@@ -2743,7 +2902,7 @@ def doModifyAuditConfig(args, parsed_globals):
|
|
|
2743
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2904
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2906
|
if g_param[OptionsDefine.Language]:
|
|
2748
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +2942,10 @@ def doModifyInstancePasswordComplexity(args, parsed_globals):
|
|
|
2783
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
2944
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
2950
|
else:
|
|
2789
2951
|
cred = credential.Credential(
|
|
@@ -2795,7 +2957,7 @@ def doModifyInstancePasswordComplexity(args, parsed_globals):
|
|
|
2795
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
2959
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
2961
|
if g_param[OptionsDefine.Language]:
|
|
2800
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +2997,10 @@ def doModifyTimeWindow(args, parsed_globals):
|
|
|
2835
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
2999
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3005
|
else:
|
|
2841
3006
|
cred = credential.Credential(
|
|
@@ -2847,7 +3012,7 @@ def doModifyTimeWindow(args, parsed_globals):
|
|
|
2847
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3014
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3016
|
if g_param[OptionsDefine.Language]:
|
|
2852
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +3052,10 @@ def doDeleteDeployGroups(args, parsed_globals):
|
|
|
2887
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3054
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3060
|
else:
|
|
2893
3061
|
cred = credential.Credential(
|
|
@@ -2899,7 +3067,7 @@ def doDeleteDeployGroups(args, parsed_globals):
|
|
|
2899
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3069
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3071
|
if g_param[OptionsDefine.Language]:
|
|
2904
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3107,10 @@ def doSwitchForUpgrade(args, parsed_globals):
|
|
|
2939
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3109
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3115
|
else:
|
|
2945
3116
|
cred = credential.Credential(
|
|
@@ -2951,7 +3122,7 @@ def doSwitchForUpgrade(args, parsed_globals):
|
|
|
2951
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3124
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3126
|
if g_param[OptionsDefine.Language]:
|
|
2956
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3162,10 @@ def doDeleteAuditRuleTemplates(args, parsed_globals):
|
|
|
2991
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3164
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3170
|
else:
|
|
2997
3171
|
cred = credential.Credential(
|
|
@@ -3003,7 +3177,7 @@ def doDeleteAuditRuleTemplates(args, parsed_globals):
|
|
|
3003
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3179
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3181
|
if g_param[OptionsDefine.Language]:
|
|
3008
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3217,10 @@ def doDescribeBackups(args, parsed_globals):
|
|
|
3043
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3219
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3225
|
else:
|
|
3049
3226
|
cred = credential.Credential(
|
|
@@ -3055,7 +3232,7 @@ def doDescribeBackups(args, parsed_globals):
|
|
|
3055
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3234
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3236
|
if g_param[OptionsDefine.Language]:
|
|
3060
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3272,10 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
3095
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3274
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3280
|
else:
|
|
3101
3281
|
cred = credential.Credential(
|
|
@@ -3107,7 +3287,7 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
3107
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3289
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3291
|
if g_param[OptionsDefine.Language]:
|
|
3112
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3327,10 @@ def doCreateParamTemplate(args, parsed_globals):
|
|
|
3147
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3329
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3335
|
else:
|
|
3153
3336
|
cred = credential.Credential(
|
|
@@ -3159,7 +3342,7 @@ def doCreateParamTemplate(args, parsed_globals):
|
|
|
3159
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3344
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3346
|
if g_param[OptionsDefine.Language]:
|
|
3164
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3382,10 @@ def doCreateDBInstanceHour(args, parsed_globals):
|
|
|
3199
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3384
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3390
|
else:
|
|
3205
3391
|
cred = credential.Credential(
|
|
@@ -3211,7 +3397,7 @@ def doCreateDBInstanceHour(args, parsed_globals):
|
|
|
3211
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3399
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3401
|
if g_param[OptionsDefine.Language]:
|
|
3216
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3437,10 @@ def doAddTimeWindow(args, parsed_globals):
|
|
|
3251
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3439
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3445
|
else:
|
|
3257
3446
|
cred = credential.Credential(
|
|
@@ -3263,7 +3452,7 @@ def doAddTimeWindow(args, parsed_globals):
|
|
|
3263
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3454
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3456
|
if g_param[OptionsDefine.Language]:
|
|
3268
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3492,10 @@ def doDescribeProxySupportParam(args, parsed_globals):
|
|
|
3303
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3494
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3500
|
else:
|
|
3309
3501
|
cred = credential.Credential(
|
|
@@ -3315,7 +3507,7 @@ def doDescribeProxySupportParam(args, parsed_globals):
|
|
|
3315
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3509
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3511
|
if g_param[OptionsDefine.Language]:
|
|
3320
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3547,10 @@ def doDescribeDeviceMonitorInfo(args, parsed_globals):
|
|
|
3355
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3549
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3555
|
else:
|
|
3361
3556
|
cred = credential.Credential(
|
|
@@ -3367,7 +3562,7 @@ def doDescribeDeviceMonitorInfo(args, parsed_globals):
|
|
|
3367
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3564
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3566
|
if g_param[OptionsDefine.Language]:
|
|
3372
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3602,10 @@ def doCreateBackup(args, parsed_globals):
|
|
|
3407
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3604
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3610
|
else:
|
|
3413
3611
|
cred = credential.Credential(
|
|
@@ -3419,7 +3617,7 @@ def doCreateBackup(args, parsed_globals):
|
|
|
3419
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3619
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3621
|
if g_param[OptionsDefine.Language]:
|
|
3424
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3657,10 @@ def doModifyDBInstanceVipVport(args, parsed_globals):
|
|
|
3459
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3659
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3665
|
else:
|
|
3465
3666
|
cred = credential.Credential(
|
|
@@ -3471,7 +3672,7 @@ def doModifyDBInstanceVipVport(args, parsed_globals):
|
|
|
3471
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3674
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3676
|
if g_param[OptionsDefine.Language]:
|
|
3476
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +3712,10 @@ def doDescribeDBInstanceConfig(args, parsed_globals):
|
|
|
3511
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3714
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3720
|
else:
|
|
3517
3721
|
cred = credential.Credential(
|
|
@@ -3523,7 +3727,7 @@ def doDescribeDBInstanceConfig(args, parsed_globals):
|
|
|
3523
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3729
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3731
|
if g_param[OptionsDefine.Language]:
|
|
3528
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3553,6 +3757,61 @@ def doDescribeDBInstanceConfig(args, parsed_globals):
|
|
|
3553
3757
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3554
3758
|
|
|
3555
3759
|
|
|
3760
|
+
def doDescribeInstancePasswordComplexity(args, parsed_globals):
|
|
3761
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3762
|
+
|
|
3763
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3764
|
+
cred = credential.CVMRoleCredential()
|
|
3765
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3766
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3767
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3768
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3769
|
+
)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3774
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3775
|
+
else:
|
|
3776
|
+
cred = credential.Credential(
|
|
3777
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3778
|
+
)
|
|
3779
|
+
http_profile = HttpProfile(
|
|
3780
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3781
|
+
reqMethod="POST",
|
|
3782
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3783
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3784
|
+
)
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3786
|
+
if g_param[OptionsDefine.Language]:
|
|
3787
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3788
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3789
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3790
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3791
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3792
|
+
model = models.DescribeInstancePasswordComplexityRequest()
|
|
3793
|
+
model.from_json_string(json.dumps(args))
|
|
3794
|
+
start_time = time.time()
|
|
3795
|
+
while True:
|
|
3796
|
+
rsp = client.DescribeInstancePasswordComplexity(model)
|
|
3797
|
+
result = rsp.to_json_string()
|
|
3798
|
+
try:
|
|
3799
|
+
json_obj = json.loads(result)
|
|
3800
|
+
except TypeError as e:
|
|
3801
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3802
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3803
|
+
break
|
|
3804
|
+
cur_time = time.time()
|
|
3805
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3806
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3807
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3808
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3809
|
+
else:
|
|
3810
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3811
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3812
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3813
|
+
|
|
3814
|
+
|
|
3556
3815
|
def doCreateCdbProxyAddress(args, parsed_globals):
|
|
3557
3816
|
g_param = parse_global_arg(parsed_globals)
|
|
3558
3817
|
|
|
@@ -3563,7 +3822,10 @@ def doCreateCdbProxyAddress(args, parsed_globals):
|
|
|
3563
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3824
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3830
|
else:
|
|
3569
3831
|
cred = credential.Credential(
|
|
@@ -3575,7 +3837,7 @@ def doCreateCdbProxyAddress(args, parsed_globals):
|
|
|
3575
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3839
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3841
|
if g_param[OptionsDefine.Language]:
|
|
3580
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +3877,10 @@ def doDeleteAuditPolicy(args, parsed_globals):
|
|
|
3615
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3879
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3885
|
else:
|
|
3621
3886
|
cred = credential.Credential(
|
|
@@ -3627,7 +3892,7 @@ def doDeleteAuditPolicy(args, parsed_globals):
|
|
|
3627
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
3894
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
3896
|
if g_param[OptionsDefine.Language]:
|
|
3632
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +3932,10 @@ def doDescribeProjectSecurityGroups(args, parsed_globals):
|
|
|
3667
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
3934
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
3940
|
else:
|
|
3673
3941
|
cred = credential.Credential(
|
|
@@ -3679,7 +3947,7 @@ def doDescribeProjectSecurityGroups(args, parsed_globals):
|
|
|
3679
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
3949
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
3951
|
if g_param[OptionsDefine.Language]:
|
|
3684
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +3987,10 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
3719
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
3989
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
3995
|
else:
|
|
3725
3996
|
cred = credential.Credential(
|
|
@@ -3731,7 +4002,7 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
3731
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4004
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4006
|
if g_param[OptionsDefine.Language]:
|
|
3736
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +4042,10 @@ def doInquiryPriceUpgradeInstances(args, parsed_globals):
|
|
|
3771
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4044
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4050
|
else:
|
|
3777
4051
|
cred = credential.Credential(
|
|
@@ -3783,7 +4057,7 @@ def doInquiryPriceUpgradeInstances(args, parsed_globals):
|
|
|
3783
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4059
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4061
|
if g_param[OptionsDefine.Language]:
|
|
3788
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +4097,10 @@ def doModifyInstanceParam(args, parsed_globals):
|
|
|
3823
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4099
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4105
|
else:
|
|
3829
4106
|
cred = credential.Credential(
|
|
@@ -3835,7 +4112,7 @@ def doModifyInstanceParam(args, parsed_globals):
|
|
|
3835
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4114
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4116
|
if g_param[OptionsDefine.Language]:
|
|
3840
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3875,7 +4152,10 @@ def doCreateDBInstance(args, parsed_globals):
|
|
|
3875
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4154
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4160
|
else:
|
|
3881
4161
|
cred = credential.Credential(
|
|
@@ -3887,7 +4167,7 @@ def doCreateDBInstance(args, parsed_globals):
|
|
|
3887
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4169
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4171
|
if g_param[OptionsDefine.Language]:
|
|
3892
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3927,7 +4207,10 @@ def doModifyParamTemplate(args, parsed_globals):
|
|
|
3927
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4209
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4215
|
else:
|
|
3933
4216
|
cred = credential.Credential(
|
|
@@ -3939,7 +4222,7 @@ def doModifyParamTemplate(args, parsed_globals):
|
|
|
3939
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4224
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4226
|
if g_param[OptionsDefine.Language]:
|
|
3944
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3979,7 +4262,10 @@ def doDescribeInstanceParams(args, parsed_globals):
|
|
|
3979
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4264
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4270
|
else:
|
|
3985
4271
|
cred = credential.Credential(
|
|
@@ -3991,7 +4277,7 @@ def doDescribeInstanceParams(args, parsed_globals):
|
|
|
3991
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4279
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4281
|
if g_param[OptionsDefine.Language]:
|
|
3996
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4031,7 +4317,10 @@ def doDescribeBackupEncryptionStatus(args, parsed_globals):
|
|
|
4031
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4319
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4325
|
else:
|
|
4037
4326
|
cred = credential.Credential(
|
|
@@ -4043,7 +4332,7 @@ def doDescribeBackupEncryptionStatus(args, parsed_globals):
|
|
|
4043
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4334
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4336
|
if g_param[OptionsDefine.Language]:
|
|
4048
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4083,7 +4372,10 @@ def doDescribeProxyCustomConf(args, parsed_globals):
|
|
|
4083
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4374
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4380
|
else:
|
|
4089
4381
|
cred = credential.Credential(
|
|
@@ -4095,7 +4387,7 @@ def doDescribeProxyCustomConf(args, parsed_globals):
|
|
|
4095
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4389
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4391
|
if g_param[OptionsDefine.Language]:
|
|
4100
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4135,7 +4427,10 @@ def doDescribeDeployGroupList(args, parsed_globals):
|
|
|
4135
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4429
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4435
|
else:
|
|
4141
4436
|
cred = credential.Credential(
|
|
@@ -4147,7 +4442,7 @@ def doDescribeDeployGroupList(args, parsed_globals):
|
|
|
4147
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4444
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4446
|
if g_param[OptionsDefine.Language]:
|
|
4152
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4187,7 +4482,10 @@ def doStopDBImportJob(args, parsed_globals):
|
|
|
4187
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4484
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4490
|
else:
|
|
4193
4491
|
cred = credential.Credential(
|
|
@@ -4199,7 +4497,7 @@ def doStopDBImportJob(args, parsed_globals):
|
|
|
4199
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4499
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4501
|
if g_param[OptionsDefine.Language]:
|
|
4204
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4239,7 +4537,10 @@ def doAnalyzeAuditLogs(args, parsed_globals):
|
|
|
4239
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4539
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4545
|
else:
|
|
4245
4546
|
cred = credential.Credential(
|
|
@@ -4251,7 +4552,7 @@ def doAnalyzeAuditLogs(args, parsed_globals):
|
|
|
4251
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4554
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4556
|
if g_param[OptionsDefine.Language]:
|
|
4256
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4291,7 +4592,10 @@ def doCreateAccounts(args, parsed_globals):
|
|
|
4291
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4594
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4600
|
else:
|
|
4297
4601
|
cred = credential.Credential(
|
|
@@ -4303,7 +4607,7 @@ def doCreateAccounts(args, parsed_globals):
|
|
|
4303
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4609
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4611
|
if g_param[OptionsDefine.Language]:
|
|
4308
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4343,7 +4647,10 @@ def doAdjustCdbProxy(args, parsed_globals):
|
|
|
4343
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4649
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4655
|
else:
|
|
4349
4656
|
cred = credential.Credential(
|
|
@@ -4355,7 +4662,7 @@ def doAdjustCdbProxy(args, parsed_globals):
|
|
|
4355
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4664
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4666
|
if g_param[OptionsDefine.Language]:
|
|
4360
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4395,7 +4702,10 @@ def doUpgradeDBInstanceEngineVersion(args, parsed_globals):
|
|
|
4395
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4704
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4710
|
else:
|
|
4401
4711
|
cred = credential.Credential(
|
|
@@ -4407,7 +4717,7 @@ def doUpgradeDBInstanceEngineVersion(args, parsed_globals):
|
|
|
4407
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4719
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4721
|
if g_param[OptionsDefine.Language]:
|
|
4412
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +4757,10 @@ def doDescribeAuditLogFiles(args, parsed_globals):
|
|
|
4447
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4759
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4765
|
else:
|
|
4453
4766
|
cred = credential.Credential(
|
|
@@ -4459,7 +4772,7 @@ def doDescribeAuditLogFiles(args, parsed_globals):
|
|
|
4459
4772
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
4773
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
4774
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
4776
|
if g_param[OptionsDefine.Language]:
|
|
4464
4777
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
4778
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4499,7 +4812,10 @@ def doDescribeBackupDecryptionKey(args, parsed_globals):
|
|
|
4499
4812
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4813
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4814
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4820
|
else:
|
|
4505
4821
|
cred = credential.Credential(
|
|
@@ -4511,7 +4827,7 @@ def doDescribeBackupDecryptionKey(args, parsed_globals):
|
|
|
4511
4827
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
4828
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
4829
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
4831
|
if g_param[OptionsDefine.Language]:
|
|
4516
4832
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
4833
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4551,7 +4867,10 @@ def doDescribeInstanceParamRecords(args, parsed_globals):
|
|
|
4551
4867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
4868
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
4869
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
4874
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
4875
|
else:
|
|
4557
4876
|
cred = credential.Credential(
|
|
@@ -4563,7 +4882,7 @@ def doDescribeInstanceParamRecords(args, parsed_globals):
|
|
|
4563
4882
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
4883
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
4884
|
)
|
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4567
4886
|
if g_param[OptionsDefine.Language]:
|
|
4568
4887
|
profile.language = g_param[OptionsDefine.Language]
|
|
4569
4888
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4603,7 +4922,10 @@ def doDeleteAuditRule(args, parsed_globals):
|
|
|
4603
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
4924
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
4930
|
else:
|
|
4609
4931
|
cred = credential.Credential(
|
|
@@ -4615,7 +4937,7 @@ def doDeleteAuditRule(args, parsed_globals):
|
|
|
4615
4937
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4616
4938
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4617
4939
|
)
|
|
4618
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4619
4941
|
if g_param[OptionsDefine.Language]:
|
|
4620
4942
|
profile.language = g_param[OptionsDefine.Language]
|
|
4621
4943
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4655,7 +4977,10 @@ def doDescribeBackupSummaries(args, parsed_globals):
|
|
|
4655
4977
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
4978
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
4979
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
4984
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
4985
|
else:
|
|
4661
4986
|
cred = credential.Credential(
|
|
@@ -4667,7 +4992,7 @@ def doDescribeBackupSummaries(args, parsed_globals):
|
|
|
4667
4992
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4668
4993
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4669
4994
|
)
|
|
4670
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4671
4996
|
if g_param[OptionsDefine.Language]:
|
|
4672
4997
|
profile.language = g_param[OptionsDefine.Language]
|
|
4673
4998
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4707,7 +5032,10 @@ def doDescribeParamTemplateInfo(args, parsed_globals):
|
|
|
4707
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4708
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4709
5034
|
)
|
|
4710
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
5040
|
else:
|
|
4713
5041
|
cred = credential.Credential(
|
|
@@ -4719,7 +5047,7 @@ def doDescribeParamTemplateInfo(args, parsed_globals):
|
|
|
4719
5047
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4720
5048
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4721
5049
|
)
|
|
4722
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4723
5051
|
if g_param[OptionsDefine.Language]:
|
|
4724
5052
|
profile.language = g_param[OptionsDefine.Language]
|
|
4725
5053
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4759,7 +5087,10 @@ def doDescribeBinlogBackupOverview(args, parsed_globals):
|
|
|
4759
5087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
5088
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
5089
|
)
|
|
4762
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
5094
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
5095
|
else:
|
|
4765
5096
|
cred = credential.Credential(
|
|
@@ -4771,7 +5102,7 @@ def doDescribeBinlogBackupOverview(args, parsed_globals):
|
|
|
4771
5102
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4772
5103
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4773
5104
|
)
|
|
4774
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4775
5106
|
if g_param[OptionsDefine.Language]:
|
|
4776
5107
|
profile.language = g_param[OptionsDefine.Language]
|
|
4777
5108
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4811,7 +5142,10 @@ def doModifyBackupEncryptionStatus(args, parsed_globals):
|
|
|
4811
5142
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4812
5143
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4813
5144
|
)
|
|
4814
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4815
5149
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4816
5150
|
else:
|
|
4817
5151
|
cred = credential.Credential(
|
|
@@ -4823,7 +5157,7 @@ def doModifyBackupEncryptionStatus(args, parsed_globals):
|
|
|
4823
5157
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4824
5158
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4825
5159
|
)
|
|
4826
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5160
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4827
5161
|
if g_param[OptionsDefine.Language]:
|
|
4828
5162
|
profile.language = g_param[OptionsDefine.Language]
|
|
4829
5163
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4863,7 +5197,10 @@ def doSwitchDrInstanceToMaster(args, parsed_globals):
|
|
|
4863
5197
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4864
5198
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4865
5199
|
)
|
|
4866
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4867
5204
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4868
5205
|
else:
|
|
4869
5206
|
cred = credential.Credential(
|
|
@@ -4875,7 +5212,7 @@ def doSwitchDrInstanceToMaster(args, parsed_globals):
|
|
|
4875
5212
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4876
5213
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4877
5214
|
)
|
|
4878
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5215
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4879
5216
|
if g_param[OptionsDefine.Language]:
|
|
4880
5217
|
profile.language = g_param[OptionsDefine.Language]
|
|
4881
5218
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4915,7 +5252,10 @@ def doDeleteAccounts(args, parsed_globals):
|
|
|
4915
5252
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4916
5253
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4917
5254
|
)
|
|
4918
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4919
5259
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4920
5260
|
else:
|
|
4921
5261
|
cred = credential.Credential(
|
|
@@ -4927,7 +5267,7 @@ def doDeleteAccounts(args, parsed_globals):
|
|
|
4927
5267
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4928
5268
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4929
5269
|
)
|
|
4930
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5270
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4931
5271
|
if g_param[OptionsDefine.Language]:
|
|
4932
5272
|
profile.language = g_param[OptionsDefine.Language]
|
|
4933
5273
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4967,7 +5307,10 @@ def doDescribeDBInstanceInfo(args, parsed_globals):
|
|
|
4967
5307
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4968
5308
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4969
5309
|
)
|
|
4970
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5310
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5311
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5312
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4971
5314
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4972
5315
|
else:
|
|
4973
5316
|
cred = credential.Credential(
|
|
@@ -4979,7 +5322,7 @@ def doDescribeDBInstanceInfo(args, parsed_globals):
|
|
|
4979
5322
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4980
5323
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4981
5324
|
)
|
|
4982
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5325
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4983
5326
|
if g_param[OptionsDefine.Language]:
|
|
4984
5327
|
profile.language = g_param[OptionsDefine.Language]
|
|
4985
5328
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5019,7 +5362,10 @@ def doDescribeClusterInfo(args, parsed_globals):
|
|
|
5019
5362
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5020
5363
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5021
5364
|
)
|
|
5022
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5365
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5366
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5367
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5023
5369
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5024
5370
|
else:
|
|
5025
5371
|
cred = credential.Credential(
|
|
@@ -5031,7 +5377,7 @@ def doDescribeClusterInfo(args, parsed_globals):
|
|
|
5031
5377
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5032
5378
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5033
5379
|
)
|
|
5034
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5380
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5035
5381
|
if g_param[OptionsDefine.Language]:
|
|
5036
5382
|
profile.language = g_param[OptionsDefine.Language]
|
|
5037
5383
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5071,7 +5417,10 @@ def doDescribeRollbackRangeTime(args, parsed_globals):
|
|
|
5071
5417
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5072
5418
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5073
5419
|
)
|
|
5074
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5420
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5421
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5422
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5075
5424
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5076
5425
|
else:
|
|
5077
5426
|
cred = credential.Credential(
|
|
@@ -5083,7 +5432,7 @@ def doDescribeRollbackRangeTime(args, parsed_globals):
|
|
|
5083
5432
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5084
5433
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5085
5434
|
)
|
|
5086
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5435
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5087
5436
|
if g_param[OptionsDefine.Language]:
|
|
5088
5437
|
profile.language = g_param[OptionsDefine.Language]
|
|
5089
5438
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5123,7 +5472,10 @@ def doDescribeParamTemplates(args, parsed_globals):
|
|
|
5123
5472
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5124
5473
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5125
5474
|
)
|
|
5126
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5475
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5476
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5477
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5127
5479
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5128
5480
|
else:
|
|
5129
5481
|
cred = credential.Credential(
|
|
@@ -5135,7 +5487,7 @@ def doDescribeParamTemplates(args, parsed_globals):
|
|
|
5135
5487
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5136
5488
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5137
5489
|
)
|
|
5138
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5490
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5139
5491
|
if g_param[OptionsDefine.Language]:
|
|
5140
5492
|
profile.language = g_param[OptionsDefine.Language]
|
|
5141
5493
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5175,7 +5527,10 @@ def doDeleteBackup(args, parsed_globals):
|
|
|
5175
5527
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5176
5528
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5177
5529
|
)
|
|
5178
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5530
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5531
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5532
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5179
5534
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5180
5535
|
else:
|
|
5181
5536
|
cred = credential.Credential(
|
|
@@ -5187,7 +5542,7 @@ def doDeleteBackup(args, parsed_globals):
|
|
|
5187
5542
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5188
5543
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5189
5544
|
)
|
|
5190
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5545
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5191
5546
|
if g_param[OptionsDefine.Language]:
|
|
5192
5547
|
profile.language = g_param[OptionsDefine.Language]
|
|
5193
5548
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5227,7 +5582,10 @@ def doModifyDBInstanceModes(args, parsed_globals):
|
|
|
5227
5582
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5228
5583
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5229
5584
|
)
|
|
5230
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5585
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5586
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5587
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5231
5589
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5232
5590
|
else:
|
|
5233
5591
|
cred = credential.Credential(
|
|
@@ -5239,7 +5597,7 @@ def doModifyDBInstanceModes(args, parsed_globals):
|
|
|
5239
5597
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5240
5598
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5241
5599
|
)
|
|
5242
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5600
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5243
5601
|
if g_param[OptionsDefine.Language]:
|
|
5244
5602
|
profile.language = g_param[OptionsDefine.Language]
|
|
5245
5603
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5279,7 +5637,10 @@ def doDescribeRoMinScale(args, parsed_globals):
|
|
|
5279
5637
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5280
5638
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5281
5639
|
)
|
|
5282
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5640
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5641
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5642
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5283
5644
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5284
5645
|
else:
|
|
5285
5646
|
cred = credential.Credential(
|
|
@@ -5291,7 +5652,7 @@ def doDescribeRoMinScale(args, parsed_globals):
|
|
|
5291
5652
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5292
5653
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5293
5654
|
)
|
|
5294
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5655
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5295
5656
|
if g_param[OptionsDefine.Language]:
|
|
5296
5657
|
profile.language = g_param[OptionsDefine.Language]
|
|
5297
5658
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5331,7 +5692,10 @@ def doModifyCdbProxyAddressDesc(args, parsed_globals):
|
|
|
5331
5692
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5332
5693
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5333
5694
|
)
|
|
5334
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5695
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5696
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5697
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5335
5699
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5336
5700
|
else:
|
|
5337
5701
|
cred = credential.Credential(
|
|
@@ -5343,7 +5707,7 @@ def doModifyCdbProxyAddressDesc(args, parsed_globals):
|
|
|
5343
5707
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5344
5708
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5345
5709
|
)
|
|
5346
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5710
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5347
5711
|
if g_param[OptionsDefine.Language]:
|
|
5348
5712
|
profile.language = g_param[OptionsDefine.Language]
|
|
5349
5713
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5383,7 +5747,10 @@ def doModifyAccountHost(args, parsed_globals):
|
|
|
5383
5747
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5384
5748
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5385
5749
|
)
|
|
5386
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5750
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5751
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5752
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5387
5754
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5388
5755
|
else:
|
|
5389
5756
|
cred = credential.Credential(
|
|
@@ -5395,7 +5762,7 @@ def doModifyAccountHost(args, parsed_globals):
|
|
|
5395
5762
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5396
5763
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5397
5764
|
)
|
|
5398
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5765
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5399
5766
|
if g_param[OptionsDefine.Language]:
|
|
5400
5767
|
profile.language = g_param[OptionsDefine.Language]
|
|
5401
5768
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5435,7 +5802,10 @@ def doAdjustCdbProxyAddress(args, parsed_globals):
|
|
|
5435
5802
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5436
5803
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5437
5804
|
)
|
|
5438
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5805
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5806
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5807
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5439
5809
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5440
5810
|
else:
|
|
5441
5811
|
cred = credential.Credential(
|
|
@@ -5447,7 +5817,7 @@ def doAdjustCdbProxyAddress(args, parsed_globals):
|
|
|
5447
5817
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5448
5818
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5449
5819
|
)
|
|
5450
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5820
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5451
5821
|
if g_param[OptionsDefine.Language]:
|
|
5452
5822
|
profile.language = g_param[OptionsDefine.Language]
|
|
5453
5823
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5487,7 +5857,10 @@ def doDescribeCdbProxyInfo(args, parsed_globals):
|
|
|
5487
5857
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5488
5858
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5489
5859
|
)
|
|
5490
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5860
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5861
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5862
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5491
5864
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5492
5865
|
else:
|
|
5493
5866
|
cred = credential.Credential(
|
|
@@ -5499,7 +5872,7 @@ def doDescribeCdbProxyInfo(args, parsed_globals):
|
|
|
5499
5872
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5500
5873
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5501
5874
|
)
|
|
5502
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5875
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5503
5876
|
if g_param[OptionsDefine.Language]:
|
|
5504
5877
|
profile.language = g_param[OptionsDefine.Language]
|
|
5505
5878
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5539,7 +5912,10 @@ def doDescribeAuditConfig(args, parsed_globals):
|
|
|
5539
5912
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5540
5913
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5541
5914
|
)
|
|
5542
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5915
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5916
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5917
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5543
5919
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5544
5920
|
else:
|
|
5545
5921
|
cred = credential.Credential(
|
|
@@ -5551,7 +5927,7 @@ def doDescribeAuditConfig(args, parsed_globals):
|
|
|
5551
5927
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5552
5928
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5553
5929
|
)
|
|
5554
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5930
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5555
5931
|
if g_param[OptionsDefine.Language]:
|
|
5556
5932
|
profile.language = g_param[OptionsDefine.Language]
|
|
5557
5933
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5591,7 +5967,10 @@ def doResetPassword(args, parsed_globals):
|
|
|
5591
5967
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5592
5968
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5593
5969
|
)
|
|
5594
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5970
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5971
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5972
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5595
5974
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5596
5975
|
else:
|
|
5597
5976
|
cred = credential.Credential(
|
|
@@ -5603,7 +5982,7 @@ def doResetPassword(args, parsed_globals):
|
|
|
5603
5982
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5604
5983
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5605
5984
|
)
|
|
5606
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5985
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5607
5986
|
if g_param[OptionsDefine.Language]:
|
|
5608
5987
|
profile.language = g_param[OptionsDefine.Language]
|
|
5609
5988
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5643,7 +6022,10 @@ def doModifyLocalBinlogConfig(args, parsed_globals):
|
|
|
5643
6022
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5644
6023
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5645
6024
|
)
|
|
5646
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6025
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6026
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6027
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6028
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5647
6029
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5648
6030
|
else:
|
|
5649
6031
|
cred = credential.Credential(
|
|
@@ -5655,7 +6037,7 @@ def doModifyLocalBinlogConfig(args, parsed_globals):
|
|
|
5655
6037
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5656
6038
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5657
6039
|
)
|
|
5658
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6040
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5659
6041
|
if g_param[OptionsDefine.Language]:
|
|
5660
6042
|
profile.language = g_param[OptionsDefine.Language]
|
|
5661
6043
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5695,7 +6077,10 @@ def doCloseCDBProxy(args, parsed_globals):
|
|
|
5695
6077
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5696
6078
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5697
6079
|
)
|
|
5698
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6080
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6081
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6082
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6083
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5699
6084
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5700
6085
|
else:
|
|
5701
6086
|
cred = credential.Credential(
|
|
@@ -5707,7 +6092,7 @@ def doCloseCDBProxy(args, parsed_globals):
|
|
|
5707
6092
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5708
6093
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5709
6094
|
)
|
|
5710
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6095
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5711
6096
|
if g_param[OptionsDefine.Language]:
|
|
5712
6097
|
profile.language = g_param[OptionsDefine.Language]
|
|
5713
6098
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5747,7 +6132,10 @@ def doModifyProtectMode(args, parsed_globals):
|
|
|
5747
6132
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5748
6133
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5749
6134
|
)
|
|
5750
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6135
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6136
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6137
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6138
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5751
6139
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5752
6140
|
else:
|
|
5753
6141
|
cred = credential.Credential(
|
|
@@ -5759,7 +6147,7 @@ def doModifyProtectMode(args, parsed_globals):
|
|
|
5759
6147
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5760
6148
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5761
6149
|
)
|
|
5762
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6150
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5763
6151
|
if g_param[OptionsDefine.Language]:
|
|
5764
6152
|
profile.language = g_param[OptionsDefine.Language]
|
|
5765
6153
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5799,7 +6187,10 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
5799
6187
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5800
6188
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5801
6189
|
)
|
|
5802
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6190
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6191
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6192
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6193
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5803
6194
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5804
6195
|
else:
|
|
5805
6196
|
cred = credential.Credential(
|
|
@@ -5811,7 +6202,7 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
5811
6202
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5812
6203
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5813
6204
|
)
|
|
5814
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6205
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5815
6206
|
if g_param[OptionsDefine.Language]:
|
|
5816
6207
|
profile.language = g_param[OptionsDefine.Language]
|
|
5817
6208
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5851,7 +6242,10 @@ def doDescribeAuditLogs(args, parsed_globals):
|
|
|
5851
6242
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5852
6243
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5853
6244
|
)
|
|
5854
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6245
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6246
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6247
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6248
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5855
6249
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5856
6250
|
else:
|
|
5857
6251
|
cred = credential.Credential(
|
|
@@ -5863,7 +6257,7 @@ def doDescribeAuditLogs(args, parsed_globals):
|
|
|
5863
6257
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5864
6258
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5865
6259
|
)
|
|
5866
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6260
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5867
6261
|
if g_param[OptionsDefine.Language]:
|
|
5868
6262
|
profile.language = g_param[OptionsDefine.Language]
|
|
5869
6263
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5903,7 +6297,10 @@ def doDescribeDBInstanceRebootTime(args, parsed_globals):
|
|
|
5903
6297
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5904
6298
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5905
6299
|
)
|
|
5906
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6300
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6301
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6302
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6303
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5907
6304
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5908
6305
|
else:
|
|
5909
6306
|
cred = credential.Credential(
|
|
@@ -5915,7 +6312,7 @@ def doDescribeDBInstanceRebootTime(args, parsed_globals):
|
|
|
5915
6312
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5916
6313
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5917
6314
|
)
|
|
5918
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6315
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5919
6316
|
if g_param[OptionsDefine.Language]:
|
|
5920
6317
|
profile.language = g_param[OptionsDefine.Language]
|
|
5921
6318
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5955,7 +6352,10 @@ def doDescribeDBInstances(args, parsed_globals):
|
|
|
5955
6352
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5956
6353
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5957
6354
|
)
|
|
5958
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6355
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6356
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6357
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6358
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5959
6359
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5960
6360
|
else:
|
|
5961
6361
|
cred = credential.Credential(
|
|
@@ -5967,7 +6367,7 @@ def doDescribeDBInstances(args, parsed_globals):
|
|
|
5967
6367
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5968
6368
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5969
6369
|
)
|
|
5970
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6370
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5971
6371
|
if g_param[OptionsDefine.Language]:
|
|
5972
6372
|
profile.language = g_param[OptionsDefine.Language]
|
|
5973
6373
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6007,7 +6407,10 @@ def doVerifyRootAccount(args, parsed_globals):
|
|
|
6007
6407
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6008
6408
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6009
6409
|
)
|
|
6010
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6410
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6411
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6412
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6413
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6011
6414
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6012
6415
|
else:
|
|
6013
6416
|
cred = credential.Credential(
|
|
@@ -6019,7 +6422,7 @@ def doVerifyRootAccount(args, parsed_globals):
|
|
|
6019
6422
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6020
6423
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6021
6424
|
)
|
|
6022
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6425
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6023
6426
|
if g_param[OptionsDefine.Language]:
|
|
6024
6427
|
profile.language = g_param[OptionsDefine.Language]
|
|
6025
6428
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6059,7 +6462,10 @@ def doCreateAuditRule(args, parsed_globals):
|
|
|
6059
6462
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6060
6463
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6061
6464
|
)
|
|
6062
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6465
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6466
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6467
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6468
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6063
6469
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6064
6470
|
else:
|
|
6065
6471
|
cred = credential.Credential(
|
|
@@ -6071,7 +6477,7 @@ def doCreateAuditRule(args, parsed_globals):
|
|
|
6071
6477
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6072
6478
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6073
6479
|
)
|
|
6074
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6480
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6075
6481
|
if g_param[OptionsDefine.Language]:
|
|
6076
6482
|
profile.language = g_param[OptionsDefine.Language]
|
|
6077
6483
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6111,7 +6517,10 @@ def doDescribeDBInstanceCharset(args, parsed_globals):
|
|
|
6111
6517
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6112
6518
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6113
6519
|
)
|
|
6114
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6520
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6521
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6522
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6523
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6115
6524
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6116
6525
|
else:
|
|
6117
6526
|
cred = credential.Credential(
|
|
@@ -6123,7 +6532,7 @@ def doDescribeDBInstanceCharset(args, parsed_globals):
|
|
|
6123
6532
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6124
6533
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6125
6534
|
)
|
|
6126
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6535
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6127
6536
|
if g_param[OptionsDefine.Language]:
|
|
6128
6537
|
profile.language = g_param[OptionsDefine.Language]
|
|
6129
6538
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6163,7 +6572,10 @@ def doAssociateSecurityGroups(args, parsed_globals):
|
|
|
6163
6572
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6164
6573
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6165
6574
|
)
|
|
6166
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6575
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6576
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6577
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6578
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6167
6579
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6168
6580
|
else:
|
|
6169
6581
|
cred = credential.Credential(
|
|
@@ -6175,7 +6587,7 @@ def doAssociateSecurityGroups(args, parsed_globals):
|
|
|
6175
6587
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6176
6588
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6177
6589
|
)
|
|
6178
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6590
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6179
6591
|
if g_param[OptionsDefine.Language]:
|
|
6180
6592
|
profile.language = g_param[OptionsDefine.Language]
|
|
6181
6593
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6215,7 +6627,10 @@ def doDescribeDBPrice(args, parsed_globals):
|
|
|
6215
6627
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6216
6628
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6217
6629
|
)
|
|
6218
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6630
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6631
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6632
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6633
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6219
6634
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6220
6635
|
else:
|
|
6221
6636
|
cred = credential.Credential(
|
|
@@ -6227,7 +6642,7 @@ def doDescribeDBPrice(args, parsed_globals):
|
|
|
6227
6642
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6228
6643
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6229
6644
|
)
|
|
6230
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6645
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6231
6646
|
if g_param[OptionsDefine.Language]:
|
|
6232
6647
|
profile.language = g_param[OptionsDefine.Language]
|
|
6233
6648
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6267,7 +6682,10 @@ def doModifyAccountPrivileges(args, parsed_globals):
|
|
|
6267
6682
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6268
6683
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6269
6684
|
)
|
|
6270
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6685
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6686
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6687
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6688
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6271
6689
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6272
6690
|
else:
|
|
6273
6691
|
cred = credential.Credential(
|
|
@@ -6279,7 +6697,7 @@ def doModifyAccountPrivileges(args, parsed_globals):
|
|
|
6279
6697
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6280
6698
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6281
6699
|
)
|
|
6282
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6700
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6283
6701
|
if g_param[OptionsDefine.Language]:
|
|
6284
6702
|
profile.language = g_param[OptionsDefine.Language]
|
|
6285
6703
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6319,7 +6737,10 @@ def doDescribeDBImportRecords(args, parsed_globals):
|
|
|
6319
6737
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6320
6738
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6321
6739
|
)
|
|
6322
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6740
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6741
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6742
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6743
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6323
6744
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6324
6745
|
else:
|
|
6325
6746
|
cred = credential.Credential(
|
|
@@ -6331,7 +6752,7 @@ def doDescribeDBImportRecords(args, parsed_globals):
|
|
|
6331
6752
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6332
6753
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6333
6754
|
)
|
|
6334
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6755
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6335
6756
|
if g_param[OptionsDefine.Language]:
|
|
6336
6757
|
profile.language = g_param[OptionsDefine.Language]
|
|
6337
6758
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6371,7 +6792,10 @@ def doDescribeSSLStatus(args, parsed_globals):
|
|
|
6371
6792
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6372
6793
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6373
6794
|
)
|
|
6374
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6795
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6796
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6797
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6798
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6375
6799
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6376
6800
|
else:
|
|
6377
6801
|
cred = credential.Credential(
|
|
@@ -6383,7 +6807,7 @@ def doDescribeSSLStatus(args, parsed_globals):
|
|
|
6383
6807
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6384
6808
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6385
6809
|
)
|
|
6386
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6810
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6387
6811
|
if g_param[OptionsDefine.Language]:
|
|
6388
6812
|
profile.language = g_param[OptionsDefine.Language]
|
|
6389
6813
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6423,7 +6847,10 @@ def doDescribeDBSwitchRecords(args, parsed_globals):
|
|
|
6423
6847
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6424
6848
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6425
6849
|
)
|
|
6426
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6850
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6851
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6852
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6853
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6427
6854
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6428
6855
|
else:
|
|
6429
6856
|
cred = credential.Credential(
|
|
@@ -6435,7 +6862,7 @@ def doDescribeDBSwitchRecords(args, parsed_globals):
|
|
|
6435
6862
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6436
6863
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6437
6864
|
)
|
|
6438
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6865
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6439
6866
|
if g_param[OptionsDefine.Language]:
|
|
6440
6867
|
profile.language = g_param[OptionsDefine.Language]
|
|
6441
6868
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6475,7 +6902,10 @@ def doCreateRotationPassword(args, parsed_globals):
|
|
|
6475
6902
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6476
6903
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6477
6904
|
)
|
|
6478
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6905
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6906
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6907
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6908
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6479
6909
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6480
6910
|
else:
|
|
6481
6911
|
cred = credential.Credential(
|
|
@@ -6487,7 +6917,7 @@ def doCreateRotationPassword(args, parsed_globals):
|
|
|
6487
6917
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6488
6918
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6489
6919
|
)
|
|
6490
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6920
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6491
6921
|
if g_param[OptionsDefine.Language]:
|
|
6492
6922
|
profile.language = g_param[OptionsDefine.Language]
|
|
6493
6923
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6527,7 +6957,10 @@ def doCreateDBImportJob(args, parsed_globals):
|
|
|
6527
6957
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6528
6958
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6529
6959
|
)
|
|
6530
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6960
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6961
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6962
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6963
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6531
6964
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6532
6965
|
else:
|
|
6533
6966
|
cred = credential.Credential(
|
|
@@ -6539,7 +6972,7 @@ def doCreateDBImportJob(args, parsed_globals):
|
|
|
6539
6972
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6540
6973
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6541
6974
|
)
|
|
6542
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6975
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6543
6976
|
if g_param[OptionsDefine.Language]:
|
|
6544
6977
|
profile.language = g_param[OptionsDefine.Language]
|
|
6545
6978
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6579,7 +7012,10 @@ def doRestartDBInstances(args, parsed_globals):
|
|
|
6579
7012
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6580
7013
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6581
7014
|
)
|
|
6582
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7015
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7016
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7017
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7018
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6583
7019
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6584
7020
|
else:
|
|
6585
7021
|
cred = credential.Credential(
|
|
@@ -6591,7 +7027,7 @@ def doRestartDBInstances(args, parsed_globals):
|
|
|
6591
7027
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6592
7028
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6593
7029
|
)
|
|
6594
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7030
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6595
7031
|
if g_param[OptionsDefine.Language]:
|
|
6596
7032
|
profile.language = g_param[OptionsDefine.Language]
|
|
6597
7033
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6631,7 +7067,10 @@ def doDescribeCpuExpandHistory(args, parsed_globals):
|
|
|
6631
7067
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6632
7068
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6633
7069
|
)
|
|
6634
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7070
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7071
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7072
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7073
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6635
7074
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6636
7075
|
else:
|
|
6637
7076
|
cred = credential.Credential(
|
|
@@ -6643,7 +7082,7 @@ def doDescribeCpuExpandHistory(args, parsed_globals):
|
|
|
6643
7082
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6644
7083
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6645
7084
|
)
|
|
6646
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7085
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6647
7086
|
if g_param[OptionsDefine.Language]:
|
|
6648
7087
|
profile.language = g_param[OptionsDefine.Language]
|
|
6649
7088
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6683,7 +7122,10 @@ def doReloadBalanceProxyNode(args, parsed_globals):
|
|
|
6683
7122
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6684
7123
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6685
7124
|
)
|
|
6686
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7125
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7126
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7127
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7128
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6687
7129
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6688
7130
|
else:
|
|
6689
7131
|
cred = credential.Credential(
|
|
@@ -6695,7 +7137,7 @@ def doReloadBalanceProxyNode(args, parsed_globals):
|
|
|
6695
7137
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6696
7138
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6697
7139
|
)
|
|
6698
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7140
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6699
7141
|
if g_param[OptionsDefine.Language]:
|
|
6700
7142
|
profile.language = g_param[OptionsDefine.Language]
|
|
6701
7143
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6735,7 +7177,10 @@ def doModifyRoGroupInfo(args, parsed_globals):
|
|
|
6735
7177
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6736
7178
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6737
7179
|
)
|
|
6738
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7180
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7181
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7182
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7183
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6739
7184
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6740
7185
|
else:
|
|
6741
7186
|
cred = credential.Credential(
|
|
@@ -6747,7 +7192,7 @@ def doModifyRoGroupInfo(args, parsed_globals):
|
|
|
6747
7192
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6748
7193
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6749
7194
|
)
|
|
6750
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7195
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6751
7196
|
if g_param[OptionsDefine.Language]:
|
|
6752
7197
|
profile.language = g_param[OptionsDefine.Language]
|
|
6753
7198
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6787,7 +7232,10 @@ def doDescribeBackupDownloadRestriction(args, parsed_globals):
|
|
|
6787
7232
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6788
7233
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6789
7234
|
)
|
|
6790
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7235
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7236
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7237
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7238
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6791
7239
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6792
7240
|
else:
|
|
6793
7241
|
cred = credential.Credential(
|
|
@@ -6799,7 +7247,7 @@ def doDescribeBackupDownloadRestriction(args, parsed_globals):
|
|
|
6799
7247
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6800
7248
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6801
7249
|
)
|
|
6802
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7250
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6803
7251
|
if g_param[OptionsDefine.Language]:
|
|
6804
7252
|
profile.language = g_param[OptionsDefine.Language]
|
|
6805
7253
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6839,7 +7287,10 @@ def doResetRootAccount(args, parsed_globals):
|
|
|
6839
7287
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6840
7288
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6841
7289
|
)
|
|
6842
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7290
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7291
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7292
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7293
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6843
7294
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6844
7295
|
else:
|
|
6845
7296
|
cred = credential.Credential(
|
|
@@ -6851,7 +7302,7 @@ def doResetRootAccount(args, parsed_globals):
|
|
|
6851
7302
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6852
7303
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6853
7304
|
)
|
|
6854
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7305
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6855
7306
|
if g_param[OptionsDefine.Language]:
|
|
6856
7307
|
profile.language = g_param[OptionsDefine.Language]
|
|
6857
7308
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6891,7 +7342,10 @@ def doModifyAuditRuleTemplates(args, parsed_globals):
|
|
|
6891
7342
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6892
7343
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6893
7344
|
)
|
|
6894
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7345
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7346
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7347
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7348
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6895
7349
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6896
7350
|
else:
|
|
6897
7351
|
cred = credential.Credential(
|
|
@@ -6903,7 +7357,7 @@ def doModifyAuditRuleTemplates(args, parsed_globals):
|
|
|
6903
7357
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6904
7358
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6905
7359
|
)
|
|
6906
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7360
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6907
7361
|
if g_param[OptionsDefine.Language]:
|
|
6908
7362
|
profile.language = g_param[OptionsDefine.Language]
|
|
6909
7363
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6943,7 +7397,10 @@ def doSubmitInstanceUpgradeCheckJob(args, parsed_globals):
|
|
|
6943
7397
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6944
7398
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6945
7399
|
)
|
|
6946
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7400
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7401
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7402
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7403
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6947
7404
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6948
7405
|
else:
|
|
6949
7406
|
cred = credential.Credential(
|
|
@@ -6955,7 +7412,7 @@ def doSubmitInstanceUpgradeCheckJob(args, parsed_globals):
|
|
|
6955
7412
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6956
7413
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6957
7414
|
)
|
|
6958
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7415
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6959
7416
|
if g_param[OptionsDefine.Language]:
|
|
6960
7417
|
profile.language = g_param[OptionsDefine.Language]
|
|
6961
7418
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6995,7 +7452,10 @@ def doDeleteRotationPassword(args, parsed_globals):
|
|
|
6995
7452
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6996
7453
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6997
7454
|
)
|
|
6998
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7455
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7456
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7457
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7458
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6999
7459
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7000
7460
|
else:
|
|
7001
7461
|
cred = credential.Credential(
|
|
@@ -7007,7 +7467,7 @@ def doDeleteRotationPassword(args, parsed_globals):
|
|
|
7007
7467
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7008
7468
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7009
7469
|
)
|
|
7010
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7470
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7011
7471
|
if g_param[OptionsDefine.Language]:
|
|
7012
7472
|
profile.language = g_param[OptionsDefine.Language]
|
|
7013
7473
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7047,7 +7507,10 @@ def doModifyAccountPassword(args, parsed_globals):
|
|
|
7047
7507
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7048
7508
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7049
7509
|
)
|
|
7050
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7510
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7511
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7512
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7513
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7051
7514
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7052
7515
|
else:
|
|
7053
7516
|
cred = credential.Credential(
|
|
@@ -7059,7 +7522,7 @@ def doModifyAccountPassword(args, parsed_globals):
|
|
|
7059
7522
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7060
7523
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7061
7524
|
)
|
|
7062
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7525
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7063
7526
|
if g_param[OptionsDefine.Language]:
|
|
7064
7527
|
profile.language = g_param[OptionsDefine.Language]
|
|
7065
7528
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7099,7 +7562,10 @@ def doDescribeInstanceAlarmEvents(args, parsed_globals):
|
|
|
7099
7562
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7100
7563
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7101
7564
|
)
|
|
7102
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7565
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7566
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7567
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7568
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7103
7569
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7104
7570
|
else:
|
|
7105
7571
|
cred = credential.Credential(
|
|
@@ -7111,7 +7577,7 @@ def doDescribeInstanceAlarmEvents(args, parsed_globals):
|
|
|
7111
7577
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7112
7578
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7113
7579
|
)
|
|
7114
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7580
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7115
7581
|
if g_param[OptionsDefine.Language]:
|
|
7116
7582
|
profile.language = g_param[OptionsDefine.Language]
|
|
7117
7583
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7151,7 +7617,10 @@ def doDescribeUploadedFiles(args, parsed_globals):
|
|
|
7151
7617
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7152
7618
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7153
7619
|
)
|
|
7154
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7620
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7621
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7622
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7623
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7155
7624
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7156
7625
|
else:
|
|
7157
7626
|
cred = credential.Credential(
|
|
@@ -7163,7 +7632,7 @@ def doDescribeUploadedFiles(args, parsed_globals):
|
|
|
7163
7632
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7164
7633
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7165
7634
|
)
|
|
7166
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7635
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7167
7636
|
if g_param[OptionsDefine.Language]:
|
|
7168
7637
|
profile.language = g_param[OptionsDefine.Language]
|
|
7169
7638
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7203,7 +7672,10 @@ def doModifyAccountDescription(args, parsed_globals):
|
|
|
7203
7672
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7204
7673
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7205
7674
|
)
|
|
7206
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7675
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7676
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7677
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7678
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7207
7679
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7208
7680
|
else:
|
|
7209
7681
|
cred = credential.Credential(
|
|
@@ -7215,7 +7687,7 @@ def doModifyAccountDescription(args, parsed_globals):
|
|
|
7215
7687
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7216
7688
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7217
7689
|
)
|
|
7218
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7690
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7219
7691
|
if g_param[OptionsDefine.Language]:
|
|
7220
7692
|
profile.language = g_param[OptionsDefine.Language]
|
|
7221
7693
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7255,7 +7727,10 @@ def doDescribeSlowLogData(args, parsed_globals):
|
|
|
7255
7727
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7256
7728
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7257
7729
|
)
|
|
7258
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7730
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7731
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7732
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7733
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7259
7734
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7260
7735
|
else:
|
|
7261
7736
|
cred = credential.Credential(
|
|
@@ -7267,7 +7742,7 @@ def doDescribeSlowLogData(args, parsed_globals):
|
|
|
7267
7742
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7268
7743
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7269
7744
|
)
|
|
7270
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7745
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7271
7746
|
if g_param[OptionsDefine.Language]:
|
|
7272
7747
|
profile.language = g_param[OptionsDefine.Language]
|
|
7273
7748
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7307,7 +7782,10 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
7307
7782
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7308
7783
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7309
7784
|
)
|
|
7310
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7785
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7786
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7787
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7788
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7311
7789
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7312
7790
|
else:
|
|
7313
7791
|
cred = credential.Credential(
|
|
@@ -7319,7 +7797,7 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
7319
7797
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7320
7798
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7321
7799
|
)
|
|
7322
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7800
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7323
7801
|
if g_param[OptionsDefine.Language]:
|
|
7324
7802
|
profile.language = g_param[OptionsDefine.Language]
|
|
7325
7803
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7359,7 +7837,10 @@ def doDeleteAuditLogFile(args, parsed_globals):
|
|
|
7359
7837
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7360
7838
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7361
7839
|
)
|
|
7362
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7840
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7841
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7842
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7843
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7363
7844
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7364
7845
|
else:
|
|
7365
7846
|
cred = credential.Credential(
|
|
@@ -7371,7 +7852,7 @@ def doDeleteAuditLogFile(args, parsed_globals):
|
|
|
7371
7852
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7372
7853
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7373
7854
|
)
|
|
7374
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7855
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7375
7856
|
if g_param[OptionsDefine.Language]:
|
|
7376
7857
|
profile.language = g_param[OptionsDefine.Language]
|
|
7377
7858
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7411,7 +7892,10 @@ def doDescribeAuditRuleTemplates(args, parsed_globals):
|
|
|
7411
7892
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7412
7893
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7413
7894
|
)
|
|
7414
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7895
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7896
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7897
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7898
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7415
7899
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7416
7900
|
else:
|
|
7417
7901
|
cred = credential.Credential(
|
|
@@ -7423,7 +7907,7 @@ def doDescribeAuditRuleTemplates(args, parsed_globals):
|
|
|
7423
7907
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7424
7908
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7425
7909
|
)
|
|
7426
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7910
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7427
7911
|
if g_param[OptionsDefine.Language]:
|
|
7428
7912
|
profile.language = g_param[OptionsDefine.Language]
|
|
7429
7913
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7463,7 +7947,10 @@ def doModifyBackupConfig(args, parsed_globals):
|
|
|
7463
7947
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7464
7948
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7465
7949
|
)
|
|
7466
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7950
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7951
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7952
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7953
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7467
7954
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7468
7955
|
else:
|
|
7469
7956
|
cred = credential.Credential(
|
|
@@ -7475,7 +7962,7 @@ def doModifyBackupConfig(args, parsed_globals):
|
|
|
7475
7962
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7476
7963
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7477
7964
|
)
|
|
7478
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7965
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7479
7966
|
if g_param[OptionsDefine.Language]:
|
|
7480
7967
|
profile.language = g_param[OptionsDefine.Language]
|
|
7481
7968
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7515,7 +8002,10 @@ def doDescribeAuditRules(args, parsed_globals):
|
|
|
7515
8002
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7516
8003
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7517
8004
|
)
|
|
7518
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8005
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8006
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8007
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8008
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7519
8009
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7520
8010
|
else:
|
|
7521
8011
|
cred = credential.Credential(
|
|
@@ -7527,7 +8017,7 @@ def doDescribeAuditRules(args, parsed_globals):
|
|
|
7527
8017
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7528
8018
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7529
8019
|
)
|
|
7530
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8020
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7531
8021
|
if g_param[OptionsDefine.Language]:
|
|
7532
8022
|
profile.language = g_param[OptionsDefine.Language]
|
|
7533
8023
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7567,7 +8057,10 @@ def doDescribeRemoteBackupConfig(args, parsed_globals):
|
|
|
7567
8057
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7568
8058
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7569
8059
|
)
|
|
7570
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8060
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8061
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8062
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8063
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7571
8064
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7572
8065
|
else:
|
|
7573
8066
|
cred = credential.Credential(
|
|
@@ -7579,7 +8072,7 @@ def doDescribeRemoteBackupConfig(args, parsed_globals):
|
|
|
7579
8072
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7580
8073
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7581
8074
|
)
|
|
7582
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8075
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7583
8076
|
if g_param[OptionsDefine.Language]:
|
|
7584
8077
|
profile.language = g_param[OptionsDefine.Language]
|
|
7585
8078
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7619,7 +8112,10 @@ def doModifyCdbProxyAddressVipAndVPort(args, parsed_globals):
|
|
|
7619
8112
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7620
8113
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7621
8114
|
)
|
|
7622
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8115
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8116
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8117
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8118
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7623
8119
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7624
8120
|
else:
|
|
7625
8121
|
cred = credential.Credential(
|
|
@@ -7631,7 +8127,7 @@ def doModifyCdbProxyAddressVipAndVPort(args, parsed_globals):
|
|
|
7631
8127
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7632
8128
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7633
8129
|
)
|
|
7634
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8130
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7635
8131
|
if g_param[OptionsDefine.Language]:
|
|
7636
8132
|
profile.language = g_param[OptionsDefine.Language]
|
|
7637
8133
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7671,7 +8167,10 @@ def doOpenSSL(args, parsed_globals):
|
|
|
7671
8167
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7672
8168
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7673
8169
|
)
|
|
7674
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8170
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8171
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8172
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8173
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7675
8174
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7676
8175
|
else:
|
|
7677
8176
|
cred = credential.Credential(
|
|
@@ -7683,7 +8182,7 @@ def doOpenSSL(args, parsed_globals):
|
|
|
7683
8182
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7684
8183
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7685
8184
|
)
|
|
7686
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8185
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7687
8186
|
if g_param[OptionsDefine.Language]:
|
|
7688
8187
|
profile.language = g_param[OptionsDefine.Language]
|
|
7689
8188
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7723,7 +8222,10 @@ def doDescribeAuditRuleTemplateModifyHistory(args, parsed_globals):
|
|
|
7723
8222
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7724
8223
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7725
8224
|
)
|
|
7726
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8225
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8226
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8227
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8228
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7727
8229
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7728
8230
|
else:
|
|
7729
8231
|
cred = credential.Credential(
|
|
@@ -7735,7 +8237,7 @@ def doDescribeAuditRuleTemplateModifyHistory(args, parsed_globals):
|
|
|
7735
8237
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7736
8238
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7737
8239
|
)
|
|
7738
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8240
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7739
8241
|
if g_param[OptionsDefine.Language]:
|
|
7740
8242
|
profile.language = g_param[OptionsDefine.Language]
|
|
7741
8243
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7775,7 +8277,10 @@ def doCreateCdbProxy(args, parsed_globals):
|
|
|
7775
8277
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7776
8278
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7777
8279
|
)
|
|
7778
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8280
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8281
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8282
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8283
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7779
8284
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7780
8285
|
else:
|
|
7781
8286
|
cred = credential.Credential(
|
|
@@ -7787,7 +8292,7 @@ def doCreateCdbProxy(args, parsed_globals):
|
|
|
7787
8292
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7788
8293
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7789
8294
|
)
|
|
7790
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8295
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7791
8296
|
if g_param[OptionsDefine.Language]:
|
|
7792
8297
|
profile.language = g_param[OptionsDefine.Language]
|
|
7793
8298
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7827,7 +8332,10 @@ def doModifyDBInstanceReadOnlyStatus(args, parsed_globals):
|
|
|
7827
8332
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7828
8333
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7829
8334
|
)
|
|
7830
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8335
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8336
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8337
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8338
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7831
8339
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7832
8340
|
else:
|
|
7833
8341
|
cred = credential.Credential(
|
|
@@ -7839,7 +8347,7 @@ def doModifyDBInstanceReadOnlyStatus(args, parsed_globals):
|
|
|
7839
8347
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7840
8348
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7841
8349
|
)
|
|
7842
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8350
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7843
8351
|
if g_param[OptionsDefine.Language]:
|
|
7844
8352
|
profile.language = g_param[OptionsDefine.Language]
|
|
7845
8353
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7879,7 +8387,10 @@ def doModifyAutoRenewFlag(args, parsed_globals):
|
|
|
7879
8387
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7880
8388
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7881
8389
|
)
|
|
7882
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8390
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8391
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8392
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8393
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7883
8394
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7884
8395
|
else:
|
|
7885
8396
|
cred = credential.Credential(
|
|
@@ -7891,7 +8402,7 @@ def doModifyAutoRenewFlag(args, parsed_globals):
|
|
|
7891
8402
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7892
8403
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7893
8404
|
)
|
|
7894
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8405
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7895
8406
|
if g_param[OptionsDefine.Language]:
|
|
7896
8407
|
profile.language = g_param[OptionsDefine.Language]
|
|
7897
8408
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7931,7 +8442,10 @@ def doSwitchCDBProxy(args, parsed_globals):
|
|
|
7931
8442
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7932
8443
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7933
8444
|
)
|
|
7934
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8445
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8446
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8447
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8448
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7935
8449
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7936
8450
|
else:
|
|
7937
8451
|
cred = credential.Credential(
|
|
@@ -7943,7 +8457,7 @@ def doSwitchCDBProxy(args, parsed_globals):
|
|
|
7943
8457
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7944
8458
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7945
8459
|
)
|
|
7946
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8460
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7947
8461
|
if g_param[OptionsDefine.Language]:
|
|
7948
8462
|
profile.language = g_param[OptionsDefine.Language]
|
|
7949
8463
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7983,7 +8497,10 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
7983
8497
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7984
8498
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7985
8499
|
)
|
|
7986
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8500
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8501
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8502
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8503
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7987
8504
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7988
8505
|
else:
|
|
7989
8506
|
cred = credential.Credential(
|
|
@@ -7995,7 +8512,7 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
7995
8512
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7996
8513
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7997
8514
|
)
|
|
7998
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8515
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7999
8516
|
if g_param[OptionsDefine.Language]:
|
|
8000
8517
|
profile.language = g_param[OptionsDefine.Language]
|
|
8001
8518
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8035,7 +8552,10 @@ def doRenewDBInstance(args, parsed_globals):
|
|
|
8035
8552
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8036
8553
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8037
8554
|
)
|
|
8038
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8555
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8556
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8557
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8558
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8039
8559
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8040
8560
|
else:
|
|
8041
8561
|
cred = credential.Credential(
|
|
@@ -8047,7 +8567,7 @@ def doRenewDBInstance(args, parsed_globals):
|
|
|
8047
8567
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8048
8568
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8049
8569
|
)
|
|
8050
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8570
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8051
8571
|
if g_param[OptionsDefine.Language]:
|
|
8052
8572
|
profile.language = g_param[OptionsDefine.Language]
|
|
8053
8573
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8087,7 +8607,10 @@ def doStartBatchRollback(args, parsed_globals):
|
|
|
8087
8607
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8088
8608
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8089
8609
|
)
|
|
8090
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8610
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8611
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8612
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8613
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8091
8614
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8092
8615
|
else:
|
|
8093
8616
|
cred = credential.Credential(
|
|
@@ -8099,7 +8622,7 @@ def doStartBatchRollback(args, parsed_globals):
|
|
|
8099
8622
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8100
8623
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8101
8624
|
)
|
|
8102
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8625
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8103
8626
|
if g_param[OptionsDefine.Language]:
|
|
8104
8627
|
profile.language = g_param[OptionsDefine.Language]
|
|
8105
8628
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8139,7 +8662,10 @@ def doDescribeLocalBinlogConfig(args, parsed_globals):
|
|
|
8139
8662
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8140
8663
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8141
8664
|
)
|
|
8142
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8665
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8666
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8667
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8668
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8143
8669
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8144
8670
|
else:
|
|
8145
8671
|
cred = credential.Credential(
|
|
@@ -8151,7 +8677,7 @@ def doDescribeLocalBinlogConfig(args, parsed_globals):
|
|
|
8151
8677
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8152
8678
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8153
8679
|
)
|
|
8154
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8680
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8155
8681
|
if g_param[OptionsDefine.Language]:
|
|
8156
8682
|
profile.language = g_param[OptionsDefine.Language]
|
|
8157
8683
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8191,7 +8717,10 @@ def doOpenWanService(args, parsed_globals):
|
|
|
8191
8717
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8192
8718
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8193
8719
|
)
|
|
8194
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8720
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8721
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8722
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8723
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8195
8724
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8196
8725
|
else:
|
|
8197
8726
|
cred = credential.Credential(
|
|
@@ -8203,7 +8732,7 @@ def doOpenWanService(args, parsed_globals):
|
|
|
8203
8732
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8204
8733
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8205
8734
|
)
|
|
8206
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8735
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8207
8736
|
if g_param[OptionsDefine.Language]:
|
|
8208
8737
|
profile.language = g_param[OptionsDefine.Language]
|
|
8209
8738
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8243,7 +8772,10 @@ def doModifyAuditRule(args, parsed_globals):
|
|
|
8243
8772
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8244
8773
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8245
8774
|
)
|
|
8246
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8775
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8776
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8777
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8778
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8247
8779
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8248
8780
|
else:
|
|
8249
8781
|
cred = credential.Credential(
|
|
@@ -8255,7 +8787,7 @@ def doModifyAuditRule(args, parsed_globals):
|
|
|
8255
8787
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8256
8788
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8257
8789
|
)
|
|
8258
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8790
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8259
8791
|
if g_param[OptionsDefine.Language]:
|
|
8260
8792
|
profile.language = g_param[OptionsDefine.Language]
|
|
8261
8793
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8295,7 +8827,10 @@ def doModifyDBInstanceSecurityGroups(args, parsed_globals):
|
|
|
8295
8827
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8296
8828
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8297
8829
|
)
|
|
8298
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8830
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8831
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8832
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8833
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8299
8834
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8300
8835
|
else:
|
|
8301
8836
|
cred = credential.Credential(
|
|
@@ -8307,7 +8842,7 @@ def doModifyDBInstanceSecurityGroups(args, parsed_globals):
|
|
|
8307
8842
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8308
8843
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8309
8844
|
)
|
|
8310
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8845
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8311
8846
|
if g_param[OptionsDefine.Language]:
|
|
8312
8847
|
profile.language = g_param[OptionsDefine.Language]
|
|
8313
8848
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8347,7 +8882,10 @@ def doModifyDBInstanceProject(args, parsed_globals):
|
|
|
8347
8882
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8348
8883
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8349
8884
|
)
|
|
8350
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8885
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8886
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8887
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8888
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8351
8889
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8352
8890
|
else:
|
|
8353
8891
|
cred = credential.Credential(
|
|
@@ -8359,7 +8897,7 @@ def doModifyDBInstanceProject(args, parsed_globals):
|
|
|
8359
8897
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8360
8898
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8361
8899
|
)
|
|
8362
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8900
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8363
8901
|
if g_param[OptionsDefine.Language]:
|
|
8364
8902
|
profile.language = g_param[OptionsDefine.Language]
|
|
8365
8903
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8399,7 +8937,10 @@ def doStartCpuExpand(args, parsed_globals):
|
|
|
8399
8937
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8400
8938
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8401
8939
|
)
|
|
8402
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8940
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8941
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8942
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8943
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8403
8944
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8404
8945
|
else:
|
|
8405
8946
|
cred = credential.Credential(
|
|
@@ -8411,7 +8952,7 @@ def doStartCpuExpand(args, parsed_globals):
|
|
|
8411
8952
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8412
8953
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8413
8954
|
)
|
|
8414
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8955
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8415
8956
|
if g_param[OptionsDefine.Language]:
|
|
8416
8957
|
profile.language = g_param[OptionsDefine.Language]
|
|
8417
8958
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8451,7 +8992,10 @@ def doDescribeSupportedPrivileges(args, parsed_globals):
|
|
|
8451
8992
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8452
8993
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8453
8994
|
)
|
|
8454
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8995
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8996
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8997
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8998
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8455
8999
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8456
9000
|
else:
|
|
8457
9001
|
cred = credential.Credential(
|
|
@@ -8463,7 +9007,7 @@ def doDescribeSupportedPrivileges(args, parsed_globals):
|
|
|
8463
9007
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8464
9008
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8465
9009
|
)
|
|
8466
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9010
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8467
9011
|
if g_param[OptionsDefine.Language]:
|
|
8468
9012
|
profile.language = g_param[OptionsDefine.Language]
|
|
8469
9013
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8503,7 +9047,10 @@ def doDeleteParamTemplate(args, parsed_globals):
|
|
|
8503
9047
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8504
9048
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8505
9049
|
)
|
|
8506
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9050
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9051
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9052
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9053
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8507
9054
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8508
9055
|
else:
|
|
8509
9056
|
cred = credential.Credential(
|
|
@@ -8515,7 +9062,7 @@ def doDeleteParamTemplate(args, parsed_globals):
|
|
|
8515
9062
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8516
9063
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8517
9064
|
)
|
|
8518
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9065
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8519
9066
|
if g_param[OptionsDefine.Language]:
|
|
8520
9067
|
profile.language = g_param[OptionsDefine.Language]
|
|
8521
9068
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8555,7 +9102,10 @@ def doCreateDeployGroup(args, parsed_globals):
|
|
|
8555
9102
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8556
9103
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8557
9104
|
)
|
|
8558
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9105
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9106
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9107
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9108
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8559
9109
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8560
9110
|
else:
|
|
8561
9111
|
cred = credential.Credential(
|
|
@@ -8567,7 +9117,7 @@ def doCreateDeployGroup(args, parsed_globals):
|
|
|
8567
9117
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8568
9118
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8569
9119
|
)
|
|
8570
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9120
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8571
9121
|
if g_param[OptionsDefine.Language]:
|
|
8572
9122
|
profile.language = g_param[OptionsDefine.Language]
|
|
8573
9123
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8607,7 +9157,10 @@ def doDescribeBinlogs(args, parsed_globals):
|
|
|
8607
9157
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8608
9158
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8609
9159
|
)
|
|
8610
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9160
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9161
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9162
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9163
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8611
9164
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8612
9165
|
else:
|
|
8613
9166
|
cred = credential.Credential(
|
|
@@ -8619,7 +9172,7 @@ def doDescribeBinlogs(args, parsed_globals):
|
|
|
8619
9172
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8620
9173
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8621
9174
|
)
|
|
8622
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9175
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8623
9176
|
if g_param[OptionsDefine.Language]:
|
|
8624
9177
|
profile.language = g_param[OptionsDefine.Language]
|
|
8625
9178
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8659,7 +9212,10 @@ def doDescribeDBSecurityGroups(args, parsed_globals):
|
|
|
8659
9212
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8660
9213
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8661
9214
|
)
|
|
8662
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9215
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9216
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9217
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9218
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8663
9219
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8664
9220
|
else:
|
|
8665
9221
|
cred = credential.Credential(
|
|
@@ -8671,7 +9227,7 @@ def doDescribeDBSecurityGroups(args, parsed_globals):
|
|
|
8671
9227
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8672
9228
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8673
9229
|
)
|
|
8674
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9230
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8675
9231
|
if g_param[OptionsDefine.Language]:
|
|
8676
9232
|
profile.language = g_param[OptionsDefine.Language]
|
|
8677
9233
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8711,7 +9267,10 @@ def doStartReplication(args, parsed_globals):
|
|
|
8711
9267
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8712
9268
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8713
9269
|
)
|
|
8714
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9270
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9271
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9272
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9273
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8715
9274
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8716
9275
|
else:
|
|
8717
9276
|
cred = credential.Credential(
|
|
@@ -8723,7 +9282,7 @@ def doStartReplication(args, parsed_globals):
|
|
|
8723
9282
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8724
9283
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8725
9284
|
)
|
|
8726
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9285
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8727
9286
|
if g_param[OptionsDefine.Language]:
|
|
8728
9287
|
profile.language = g_param[OptionsDefine.Language]
|
|
8729
9288
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8763,7 +9322,10 @@ def doDescribeCloneList(args, parsed_globals):
|
|
|
8763
9322
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8764
9323
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8765
9324
|
)
|
|
8766
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9325
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9326
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9327
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9328
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8767
9329
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8768
9330
|
else:
|
|
8769
9331
|
cred = credential.Credential(
|
|
@@ -8775,7 +9337,7 @@ def doDescribeCloneList(args, parsed_globals):
|
|
|
8775
9337
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8776
9338
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8777
9339
|
)
|
|
8778
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9340
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8779
9341
|
if g_param[OptionsDefine.Language]:
|
|
8780
9342
|
profile.language = g_param[OptionsDefine.Language]
|
|
8781
9343
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8815,7 +9377,10 @@ def doModifyNameOrDescByDpId(args, parsed_globals):
|
|
|
8815
9377
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8816
9378
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8817
9379
|
)
|
|
8818
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9380
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9381
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9382
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9383
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8819
9384
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8820
9385
|
else:
|
|
8821
9386
|
cred = credential.Credential(
|
|
@@ -8827,7 +9392,7 @@ def doModifyNameOrDescByDpId(args, parsed_globals):
|
|
|
8827
9392
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8828
9393
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8829
9394
|
)
|
|
8830
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9395
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8831
9396
|
if g_param[OptionsDefine.Language]:
|
|
8832
9397
|
profile.language = g_param[OptionsDefine.Language]
|
|
8833
9398
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8867,7 +9432,10 @@ def doUpgradeDBInstance(args, parsed_globals):
|
|
|
8867
9432
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8868
9433
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8869
9434
|
)
|
|
8870
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9435
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9436
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9437
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9438
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8871
9439
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8872
9440
|
else:
|
|
8873
9441
|
cred = credential.Credential(
|
|
@@ -8879,7 +9447,7 @@ def doUpgradeDBInstance(args, parsed_globals):
|
|
|
8879
9447
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8880
9448
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8881
9449
|
)
|
|
8882
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9450
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8883
9451
|
if g_param[OptionsDefine.Language]:
|
|
8884
9452
|
profile.language = g_param[OptionsDefine.Language]
|
|
8885
9453
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8919,7 +9487,10 @@ def doCloseSSL(args, parsed_globals):
|
|
|
8919
9487
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8920
9488
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8921
9489
|
)
|
|
8922
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9490
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9491
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9492
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9493
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8923
9494
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8924
9495
|
else:
|
|
8925
9496
|
cred = credential.Credential(
|
|
@@ -8931,7 +9502,7 @@ def doCloseSSL(args, parsed_globals):
|
|
|
8931
9502
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8932
9503
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8933
9504
|
)
|
|
8934
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9505
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8935
9506
|
if g_param[OptionsDefine.Language]:
|
|
8936
9507
|
profile.language = g_param[OptionsDefine.Language]
|
|
8937
9508
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8971,7 +9542,10 @@ def doUpgradeCDBProxyVersion(args, parsed_globals):
|
|
|
8971
9542
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8972
9543
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8973
9544
|
)
|
|
8974
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9545
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9546
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9547
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9548
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8975
9549
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8976
9550
|
else:
|
|
8977
9551
|
cred = credential.Credential(
|
|
@@ -8983,7 +9557,7 @@ def doUpgradeCDBProxyVersion(args, parsed_globals):
|
|
|
8983
9557
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8984
9558
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8985
9559
|
)
|
|
8986
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9560
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8987
9561
|
if g_param[OptionsDefine.Language]:
|
|
8988
9562
|
profile.language = g_param[OptionsDefine.Language]
|
|
8989
9563
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -9023,7 +9597,10 @@ def doModifyRemoteBackupConfig(args, parsed_globals):
|
|
|
9023
9597
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9024
9598
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9025
9599
|
)
|
|
9026
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9600
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9601
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9602
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9603
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9027
9604
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9028
9605
|
else:
|
|
9029
9606
|
cred = credential.Credential(
|
|
@@ -9035,7 +9612,7 @@ def doModifyRemoteBackupConfig(args, parsed_globals):
|
|
|
9035
9612
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
9036
9613
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
9037
9614
|
)
|
|
9038
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9615
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
9039
9616
|
if g_param[OptionsDefine.Language]:
|
|
9040
9617
|
profile.language = g_param[OptionsDefine.Language]
|
|
9041
9618
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -9075,7 +9652,10 @@ def doModifyAccountMaxUserConnections(args, parsed_globals):
|
|
|
9075
9652
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9076
9653
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9077
9654
|
)
|
|
9078
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9655
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9656
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9657
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9658
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9079
9659
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9080
9660
|
else:
|
|
9081
9661
|
cred = credential.Credential(
|
|
@@ -9087,7 +9667,7 @@ def doModifyAccountMaxUserConnections(args, parsed_globals):
|
|
|
9087
9667
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
9088
9668
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
9089
9669
|
)
|
|
9090
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9670
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
9091
9671
|
if g_param[OptionsDefine.Language]:
|
|
9092
9672
|
profile.language = g_param[OptionsDefine.Language]
|
|
9093
9673
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -9196,6 +9776,7 @@ ACTION_MAP = {
|
|
|
9196
9776
|
"CreateBackup": doCreateBackup,
|
|
9197
9777
|
"ModifyDBInstanceVipVport": doModifyDBInstanceVipVport,
|
|
9198
9778
|
"DescribeDBInstanceConfig": doDescribeDBInstanceConfig,
|
|
9779
|
+
"DescribeInstancePasswordComplexity": doDescribeInstancePasswordComplexity,
|
|
9199
9780
|
"CreateCdbProxyAddress": doCreateCdbProxyAddress,
|
|
9200
9781
|
"DeleteAuditPolicy": doDeleteAuditPolicy,
|
|
9201
9782
|
"DescribeProjectSecurityGroups": doDescribeProjectSecurityGroups,
|