tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/cfs/cfs_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doDoDirectoryOperation(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDoDirectoryOperation(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDescribeCfsRules(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDescribeCfsRules(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doUpdateCfsFileSystemPGroup(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doUpdateCfsFileSystemPGroup(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doDescribeLifecycleDataTask(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doDescribeLifecycleDataTask(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doDeleteCfsSnapshot(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doDeleteCfsSnapshot(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doUpdateCfsSnapshotAttribute(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doUpdateCfsSnapshotAttribute(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doSetUserQuota(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doSetUserQuota(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doCreateCfsPGroup(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doCreateCfsPGroup(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doBindAutoSnapshotPolicy(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doBindAutoSnapshotPolicy(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +522,10 @@ def doCreateDataFlow(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,7 +537,7 @@ def doCreateDataFlow(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -537,7 +567,7 @@ def doCreateDataFlow(args, parsed_globals):
|
|
|
537
567
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
568
|
|
|
539
569
|
|
|
540
|
-
def
|
|
570
|
+
def doDeleteUserQuota(args, parsed_globals):
|
|
541
571
|
g_param = parse_global_arg(parsed_globals)
|
|
542
572
|
|
|
543
573
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -547,7 +577,10 @@ def doDeleteCfsPGroup(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,18 +592,18 @@ def doDeleteCfsPGroup(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
566
599
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
600
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
601
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
602
|
+
model = models.DeleteUserQuotaRequest()
|
|
570
603
|
model.from_json_string(json.dumps(args))
|
|
571
604
|
start_time = time.time()
|
|
572
605
|
while True:
|
|
573
|
-
rsp = client.
|
|
606
|
+
rsp = client.DeleteUserQuota(model)
|
|
574
607
|
result = rsp.to_json_string()
|
|
575
608
|
try:
|
|
576
609
|
json_obj = json.loads(result)
|
|
@@ -589,7 +622,7 @@ def doDeleteCfsPGroup(args, parsed_globals):
|
|
|
589
622
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
623
|
|
|
591
624
|
|
|
592
|
-
def
|
|
625
|
+
def doDeleteCfsPGroup(args, parsed_globals):
|
|
593
626
|
g_param = parse_global_arg(parsed_globals)
|
|
594
627
|
|
|
595
628
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -599,7 +632,10 @@ def doDeleteLifecyclePolicy(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,18 +647,18 @@ def doDeleteLifecyclePolicy(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
618
654
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
655
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
656
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
657
|
+
model = models.DeleteCfsPGroupRequest()
|
|
622
658
|
model.from_json_string(json.dumps(args))
|
|
623
659
|
start_time = time.time()
|
|
624
660
|
while True:
|
|
625
|
-
rsp = client.
|
|
661
|
+
rsp = client.DeleteCfsPGroup(model)
|
|
626
662
|
result = rsp.to_json_string()
|
|
627
663
|
try:
|
|
628
664
|
json_obj = json.loads(result)
|
|
@@ -641,7 +677,7 @@ def doDeleteLifecyclePolicy(args, parsed_globals):
|
|
|
641
677
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
678
|
|
|
643
679
|
|
|
644
|
-
def
|
|
680
|
+
def doDeleteLifecyclePolicy(args, parsed_globals):
|
|
645
681
|
g_param = parse_global_arg(parsed_globals)
|
|
646
682
|
|
|
647
683
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -651,7 +687,10 @@ def doCreateLifecyclePolicyDownloadTask(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,18 +702,18 @@ def doCreateLifecyclePolicyDownloadTask(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
670
709
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
671
710
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
672
711
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
673
|
-
model = models.
|
|
712
|
+
model = models.DeleteLifecyclePolicyRequest()
|
|
674
713
|
model.from_json_string(json.dumps(args))
|
|
675
714
|
start_time = time.time()
|
|
676
715
|
while True:
|
|
677
|
-
rsp = client.
|
|
716
|
+
rsp = client.DeleteLifecyclePolicy(model)
|
|
678
717
|
result = rsp.to_json_string()
|
|
679
718
|
try:
|
|
680
719
|
json_obj = json.loads(result)
|
|
@@ -693,7 +732,7 @@ def doCreateLifecyclePolicyDownloadTask(args, parsed_globals):
|
|
|
693
732
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
733
|
|
|
695
734
|
|
|
696
|
-
def
|
|
735
|
+
def doCreateLifecyclePolicyDownloadTask(args, parsed_globals):
|
|
697
736
|
g_param = parse_global_arg(parsed_globals)
|
|
698
737
|
|
|
699
738
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -703,7 +742,10 @@ def doDeleteCfsRule(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,18 +757,18 @@ def doDeleteCfsRule(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
722
764
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
765
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
766
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
767
|
+
model = models.CreateLifecyclePolicyDownloadTaskRequest()
|
|
726
768
|
model.from_json_string(json.dumps(args))
|
|
727
769
|
start_time = time.time()
|
|
728
770
|
while True:
|
|
729
|
-
rsp = client.
|
|
771
|
+
rsp = client.CreateLifecyclePolicyDownloadTask(model)
|
|
730
772
|
result = rsp.to_json_string()
|
|
731
773
|
try:
|
|
732
774
|
json_obj = json.loads(result)
|
|
@@ -745,7 +787,7 @@ def doDeleteCfsRule(args, parsed_globals):
|
|
|
745
787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
788
|
|
|
747
789
|
|
|
748
|
-
def
|
|
790
|
+
def doDeleteCfsRule(args, parsed_globals):
|
|
749
791
|
g_param = parse_global_arg(parsed_globals)
|
|
750
792
|
|
|
751
793
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -755,7 +797,10 @@ def doDescribeCfsServiceStatus(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,18 +812,18 @@ def doDescribeCfsServiceStatus(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
774
819
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
820
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
821
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
822
|
+
model = models.DeleteCfsRuleRequest()
|
|
778
823
|
model.from_json_string(json.dumps(args))
|
|
779
824
|
start_time = time.time()
|
|
780
825
|
while True:
|
|
781
|
-
rsp = client.
|
|
826
|
+
rsp = client.DeleteCfsRule(model)
|
|
782
827
|
result = rsp.to_json_string()
|
|
783
828
|
try:
|
|
784
829
|
json_obj = json.loads(result)
|
|
@@ -797,7 +842,7 @@ def doDescribeCfsServiceStatus(args, parsed_globals):
|
|
|
797
842
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
843
|
|
|
799
844
|
|
|
800
|
-
def
|
|
845
|
+
def doDescribeCfsServiceStatus(args, parsed_globals):
|
|
801
846
|
g_param = parse_global_arg(parsed_globals)
|
|
802
847
|
|
|
803
848
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -807,7 +852,10 @@ def doStopMigrationTask(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,18 +867,18 @@ def doStopMigrationTask(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
826
874
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
875
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
876
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
877
|
+
model = models.DescribeCfsServiceStatusRequest()
|
|
830
878
|
model.from_json_string(json.dumps(args))
|
|
831
879
|
start_time = time.time()
|
|
832
880
|
while True:
|
|
833
|
-
rsp = client.
|
|
881
|
+
rsp = client.DescribeCfsServiceStatus(model)
|
|
834
882
|
result = rsp.to_json_string()
|
|
835
883
|
try:
|
|
836
884
|
json_obj = json.loads(result)
|
|
@@ -849,7 +897,7 @@ def doStopMigrationTask(args, parsed_globals):
|
|
|
849
897
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
898
|
|
|
851
899
|
|
|
852
|
-
def
|
|
900
|
+
def doStopMigrationTask(args, parsed_globals):
|
|
853
901
|
g_param = parse_global_arg(parsed_globals)
|
|
854
902
|
|
|
855
903
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +907,10 @@ def doDescribeMigrationTasks(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,18 +922,18 @@ def doDescribeMigrationTasks(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
878
929
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
930
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
931
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
932
|
+
model = models.StopMigrationTaskRequest()
|
|
882
933
|
model.from_json_string(json.dumps(args))
|
|
883
934
|
start_time = time.time()
|
|
884
935
|
while True:
|
|
885
|
-
rsp = client.
|
|
936
|
+
rsp = client.StopMigrationTask(model)
|
|
886
937
|
result = rsp.to_json_string()
|
|
887
938
|
try:
|
|
888
939
|
json_obj = json.loads(result)
|
|
@@ -901,7 +952,7 @@ def doDescribeMigrationTasks(args, parsed_globals):
|
|
|
901
952
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
953
|
|
|
903
954
|
|
|
904
|
-
def
|
|
955
|
+
def doDescribeMigrationTasks(args, parsed_globals):
|
|
905
956
|
g_param = parse_global_arg(parsed_globals)
|
|
906
957
|
|
|
907
958
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -911,7 +962,10 @@ def doDescribeAvailableZoneInfo(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,18 +977,18 @@ def doDescribeAvailableZoneInfo(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
930
984
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
985
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
986
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
987
|
+
model = models.DescribeMigrationTasksRequest()
|
|
934
988
|
model.from_json_string(json.dumps(args))
|
|
935
989
|
start_time = time.time()
|
|
936
990
|
while True:
|
|
937
|
-
rsp = client.
|
|
991
|
+
rsp = client.DescribeMigrationTasks(model)
|
|
938
992
|
result = rsp.to_json_string()
|
|
939
993
|
try:
|
|
940
994
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1007,7 @@ def doDescribeAvailableZoneInfo(args, parsed_globals):
|
|
|
953
1007
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1008
|
|
|
955
1009
|
|
|
956
|
-
def
|
|
1010
|
+
def doDescribeAvailableZoneInfo(args, parsed_globals):
|
|
957
1011
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1012
|
|
|
959
1013
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -963,7 +1017,10 @@ def doCreateLifecycleDataTask(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,18 +1032,18 @@ def doCreateLifecycleDataTask(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
982
1039
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1040
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1041
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1042
|
+
model = models.DescribeAvailableZoneInfoRequest()
|
|
986
1043
|
model.from_json_string(json.dumps(args))
|
|
987
1044
|
start_time = time.time()
|
|
988
1045
|
while True:
|
|
989
|
-
rsp = client.
|
|
1046
|
+
rsp = client.DescribeAvailableZoneInfo(model)
|
|
990
1047
|
result = rsp.to_json_string()
|
|
991
1048
|
try:
|
|
992
1049
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1062,7 @@ def doCreateLifecycleDataTask(args, parsed_globals):
|
|
|
1005
1062
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1063
|
|
|
1007
1064
|
|
|
1008
|
-
def
|
|
1065
|
+
def doCreateLifecycleDataTask(args, parsed_globals):
|
|
1009
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1067
|
|
|
1011
1068
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1015,7 +1072,10 @@ def doScaleUpFileSystem(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,18 +1087,18 @@ def doScaleUpFileSystem(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1034
1094
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1095
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1097
|
+
model = models.CreateLifecycleDataTaskRequest()
|
|
1038
1098
|
model.from_json_string(json.dumps(args))
|
|
1039
1099
|
start_time = time.time()
|
|
1040
1100
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1101
|
+
rsp = client.CreateLifecycleDataTask(model)
|
|
1042
1102
|
result = rsp.to_json_string()
|
|
1043
1103
|
try:
|
|
1044
1104
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1117,7 @@ def doScaleUpFileSystem(args, parsed_globals):
|
|
|
1057
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1118
|
|
|
1059
1119
|
|
|
1060
|
-
def
|
|
1120
|
+
def doScaleUpFileSystem(args, parsed_globals):
|
|
1061
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1122
|
|
|
1063
1123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1127,10 @@ def doSignUpCfsService(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,18 +1142,18 @@ def doSignUpCfsService(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1086
1149
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1150
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1151
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1152
|
+
model = models.ScaleUpFileSystemRequest()
|
|
1090
1153
|
model.from_json_string(json.dumps(args))
|
|
1091
1154
|
start_time = time.time()
|
|
1092
1155
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1156
|
+
rsp = client.ScaleUpFileSystem(model)
|
|
1094
1157
|
result = rsp.to_json_string()
|
|
1095
1158
|
try:
|
|
1096
1159
|
json_obj = json.loads(result)
|
|
@@ -1109,7 +1172,7 @@ def doSignUpCfsService(args, parsed_globals):
|
|
|
1109
1172
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1173
|
|
|
1111
1174
|
|
|
1112
|
-
def
|
|
1175
|
+
def doSignUpCfsService(args, parsed_globals):
|
|
1113
1176
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1177
|
|
|
1115
1178
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1119,7 +1182,10 @@ def doCreateAutoSnapshotPolicy(args, parsed_globals):
|
|
|
1119
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1184
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1190
|
else:
|
|
1125
1191
|
cred = credential.Credential(
|
|
@@ -1131,18 +1197,18 @@ def doCreateAutoSnapshotPolicy(args, parsed_globals):
|
|
|
1131
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1199
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1201
|
if g_param[OptionsDefine.Language]:
|
|
1136
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1138
1204
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
1205
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
1206
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.
|
|
1207
|
+
model = models.SignUpCfsServiceRequest()
|
|
1142
1208
|
model.from_json_string(json.dumps(args))
|
|
1143
1209
|
start_time = time.time()
|
|
1144
1210
|
while True:
|
|
1145
|
-
rsp = client.
|
|
1211
|
+
rsp = client.SignUpCfsService(model)
|
|
1146
1212
|
result = rsp.to_json_string()
|
|
1147
1213
|
try:
|
|
1148
1214
|
json_obj = json.loads(result)
|
|
@@ -1171,7 +1237,10 @@ def doDeleteMigrationTask(args, parsed_globals):
|
|
|
1171
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1239
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1245
|
else:
|
|
1177
1246
|
cred = credential.Credential(
|
|
@@ -1183,7 +1252,7 @@ def doDeleteMigrationTask(args, parsed_globals):
|
|
|
1183
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1254
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1256
|
if g_param[OptionsDefine.Language]:
|
|
1188
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1292,10 @@ def doUpdateFileSystemBandwidthLimit(args, parsed_globals):
|
|
|
1223
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1294
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1300
|
else:
|
|
1229
1301
|
cred = credential.Credential(
|
|
@@ -1235,7 +1307,7 @@ def doUpdateFileSystemBandwidthLimit(args, parsed_globals):
|
|
|
1235
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1309
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1311
|
if g_param[OptionsDefine.Language]:
|
|
1240
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1347,10 @@ def doUpdateCfsFileSystemSizeLimit(args, parsed_globals):
|
|
|
1275
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1349
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1355
|
else:
|
|
1281
1356
|
cred = credential.Credential(
|
|
@@ -1287,7 +1362,7 @@ def doUpdateCfsFileSystemSizeLimit(args, parsed_globals):
|
|
|
1287
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1364
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1366
|
if g_param[OptionsDefine.Language]:
|
|
1292
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1402,10 @@ def doDeleteDataFlow(args, parsed_globals):
|
|
|
1327
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1404
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1410
|
else:
|
|
1333
1411
|
cred = credential.Credential(
|
|
@@ -1339,7 +1417,7 @@ def doDeleteDataFlow(args, parsed_globals):
|
|
|
1339
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1419
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1421
|
if g_param[OptionsDefine.Language]:
|
|
1344
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1457,10 @@ def doCreateLifecyclePolicy(args, parsed_globals):
|
|
|
1379
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1459
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1465
|
else:
|
|
1385
1466
|
cred = credential.Credential(
|
|
@@ -1391,7 +1472,7 @@ def doCreateLifecyclePolicy(args, parsed_globals):
|
|
|
1391
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1474
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1476
|
if g_param[OptionsDefine.Language]:
|
|
1396
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1512,10 @@ def doDeleteCfsFileSystem(args, parsed_globals):
|
|
|
1431
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1514
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1520
|
else:
|
|
1437
1521
|
cred = credential.Credential(
|
|
@@ -1443,7 +1527,7 @@ def doDeleteCfsFileSystem(args, parsed_globals):
|
|
|
1443
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1529
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1531
|
if g_param[OptionsDefine.Language]:
|
|
1448
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1567,10 @@ def doCreateCfsFileSystem(args, parsed_globals):
|
|
|
1483
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1569
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1575
|
else:
|
|
1489
1576
|
cred = credential.Credential(
|
|
@@ -1495,7 +1582,7 @@ def doCreateCfsFileSystem(args, parsed_globals):
|
|
|
1495
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1584
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1586
|
if g_param[OptionsDefine.Language]:
|
|
1500
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1622,10 @@ def doDescribeCfsPGroups(args, parsed_globals):
|
|
|
1535
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1624
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1630
|
else:
|
|
1541
1631
|
cred = credential.Credential(
|
|
@@ -1547,7 +1637,7 @@ def doDescribeCfsPGroups(args, parsed_globals):
|
|
|
1547
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1639
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1641
|
if g_param[OptionsDefine.Language]:
|
|
1552
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1677,10 @@ def doDescribeCfsSnapshotOverview(args, parsed_globals):
|
|
|
1587
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1679
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1685
|
else:
|
|
1593
1686
|
cred = credential.Credential(
|
|
@@ -1599,7 +1692,7 @@ def doDescribeCfsSnapshotOverview(args, parsed_globals):
|
|
|
1599
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1694
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1696
|
if g_param[OptionsDefine.Language]:
|
|
1604
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1732,10 @@ def doDescribeLifecyclePolicies(args, parsed_globals):
|
|
|
1639
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1734
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1740
|
else:
|
|
1645
1741
|
cred = credential.Credential(
|
|
@@ -1651,7 +1747,7 @@ def doDescribeLifecyclePolicies(args, parsed_globals):
|
|
|
1651
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1749
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1751
|
if g_param[OptionsDefine.Language]:
|
|
1656
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1787,10 @@ def doDescribeUserQuota(args, parsed_globals):
|
|
|
1691
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1789
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1795
|
else:
|
|
1697
1796
|
cred = credential.Credential(
|
|
@@ -1703,7 +1802,7 @@ def doDescribeUserQuota(args, parsed_globals):
|
|
|
1703
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1804
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1806
|
if g_param[OptionsDefine.Language]:
|
|
1708
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +1842,10 @@ def doApplyPathLifecyclePolicy(args, parsed_globals):
|
|
|
1743
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1844
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1850
|
else:
|
|
1749
1851
|
cred = credential.Credential(
|
|
@@ -1755,7 +1857,7 @@ def doApplyPathLifecyclePolicy(args, parsed_globals):
|
|
|
1755
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1859
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1861
|
if g_param[OptionsDefine.Language]:
|
|
1760
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +1897,10 @@ def doModifyFileSystemAutoScaleUpRule(args, parsed_globals):
|
|
|
1795
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1899
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1905
|
else:
|
|
1801
1906
|
cred = credential.Credential(
|
|
@@ -1807,7 +1912,7 @@ def doModifyFileSystemAutoScaleUpRule(args, parsed_globals):
|
|
|
1807
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1914
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1916
|
if g_param[OptionsDefine.Language]:
|
|
1812
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +1952,10 @@ def doModifyDataFlow(args, parsed_globals):
|
|
|
1847
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
1954
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
1960
|
else:
|
|
1853
1961
|
cred = credential.Credential(
|
|
@@ -1859,7 +1967,7 @@ def doModifyDataFlow(args, parsed_globals):
|
|
|
1859
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
1969
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
1971
|
if g_param[OptionsDefine.Language]:
|
|
1864
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2007,10 @@ def doCreateAccessCert(args, parsed_globals):
|
|
|
1899
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2009
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2015
|
else:
|
|
1905
2016
|
cred = credential.Credential(
|
|
@@ -1911,7 +2022,7 @@ def doCreateAccessCert(args, parsed_globals):
|
|
|
1911
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2024
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2026
|
if g_param[OptionsDefine.Language]:
|
|
1916
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +2062,10 @@ def doDescribeCfsFileSystems(args, parsed_globals):
|
|
|
1951
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2064
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2070
|
else:
|
|
1957
2071
|
cred = credential.Credential(
|
|
@@ -1963,7 +2077,7 @@ def doDescribeCfsFileSystems(args, parsed_globals):
|
|
|
1963
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2079
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2081
|
if g_param[OptionsDefine.Language]:
|
|
1968
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2117,10 @@ def doDescribeCfsSnapshots(args, parsed_globals):
|
|
|
2003
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2119
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2125
|
else:
|
|
2009
2126
|
cred = credential.Credential(
|
|
@@ -2015,7 +2132,7 @@ def doDescribeCfsSnapshots(args, parsed_globals):
|
|
|
2015
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2134
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2136
|
if g_param[OptionsDefine.Language]:
|
|
2020
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2172,10 @@ def doDescribeMountTargets(args, parsed_globals):
|
|
|
2055
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2174
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2180
|
else:
|
|
2061
2181
|
cred = credential.Credential(
|
|
@@ -2067,7 +2187,7 @@ def doDescribeMountTargets(args, parsed_globals):
|
|
|
2067
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2189
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2191
|
if g_param[OptionsDefine.Language]:
|
|
2072
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2227,10 @@ def doModifyLifecyclePolicy(args, parsed_globals):
|
|
|
2107
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2229
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2235
|
else:
|
|
2113
2236
|
cred = credential.Credential(
|
|
@@ -2119,7 +2242,7 @@ def doModifyLifecyclePolicy(args, parsed_globals):
|
|
|
2119
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2244
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2246
|
if g_param[OptionsDefine.Language]:
|
|
2124
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2282,10 @@ def doDescribeCfsFileSystemClients(args, parsed_globals):
|
|
|
2159
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2284
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2290
|
else:
|
|
2165
2291
|
cred = credential.Credential(
|
|
@@ -2171,7 +2297,7 @@ def doDescribeCfsFileSystemClients(args, parsed_globals):
|
|
|
2171
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2299
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2301
|
if g_param[OptionsDefine.Language]:
|
|
2176
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2337,10 @@ def doDescribeBucketList(args, parsed_globals):
|
|
|
2211
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2339
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2345
|
else:
|
|
2217
2346
|
cred = credential.Credential(
|
|
@@ -2223,7 +2352,7 @@ def doDescribeBucketList(args, parsed_globals):
|
|
|
2223
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2354
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2356
|
if g_param[OptionsDefine.Language]:
|
|
2228
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2392,10 @@ def doCreateMigrationTask(args, parsed_globals):
|
|
|
2263
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2394
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2400
|
else:
|
|
2269
2401
|
cred = credential.Credential(
|
|
@@ -2275,7 +2407,7 @@ def doCreateMigrationTask(args, parsed_globals):
|
|
|
2275
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2409
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2411
|
if g_param[OptionsDefine.Language]:
|
|
2280
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2305,59 +2437,7 @@ def doCreateMigrationTask(args, parsed_globals):
|
|
|
2305
2437
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2306
2438
|
|
|
2307
2439
|
|
|
2308
|
-
def
|
|
2309
|
-
g_param = parse_global_arg(parsed_globals)
|
|
2310
|
-
|
|
2311
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2312
|
-
cred = credential.CVMRoleCredential()
|
|
2313
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2314
|
-
cred = credential.STSAssumeRoleCredential(
|
|
2315
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
|
-
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
|
-
else:
|
|
2321
|
-
cred = credential.Credential(
|
|
2322
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2323
|
-
)
|
|
2324
|
-
http_profile = HttpProfile(
|
|
2325
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2326
|
-
reqMethod="POST",
|
|
2327
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
|
-
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2331
|
-
if g_param[OptionsDefine.Language]:
|
|
2332
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
2333
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2334
|
-
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2335
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
2336
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2337
|
-
model = models.DeleteMountTargetRequest()
|
|
2338
|
-
model.from_json_string(json.dumps(args))
|
|
2339
|
-
start_time = time.time()
|
|
2340
|
-
while True:
|
|
2341
|
-
rsp = client.DeleteMountTarget(model)
|
|
2342
|
-
result = rsp.to_json_string()
|
|
2343
|
-
try:
|
|
2344
|
-
json_obj = json.loads(result)
|
|
2345
|
-
except TypeError as e:
|
|
2346
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2347
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2348
|
-
break
|
|
2349
|
-
cur_time = time.time()
|
|
2350
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2351
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2352
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2353
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2354
|
-
else:
|
|
2355
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2356
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2357
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2358
|
-
|
|
2359
|
-
|
|
2360
|
-
def doDeleteUserQuota(args, parsed_globals):
|
|
2440
|
+
def doCreateAutoSnapshotPolicy(args, parsed_globals):
|
|
2361
2441
|
g_param = parse_global_arg(parsed_globals)
|
|
2362
2442
|
|
|
2363
2443
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2367,7 +2447,10 @@ def doDeleteUserQuota(args, parsed_globals):
|
|
|
2367
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2449
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2455
|
else:
|
|
2373
2456
|
cred = credential.Credential(
|
|
@@ -2379,18 +2462,18 @@ def doDeleteUserQuota(args, parsed_globals):
|
|
|
2379
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2464
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2466
|
if g_param[OptionsDefine.Language]:
|
|
2384
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2386
2469
|
client = mod.CfsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2387
2470
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2388
2471
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2389
|
-
model = models.
|
|
2472
|
+
model = models.CreateAutoSnapshotPolicyRequest()
|
|
2390
2473
|
model.from_json_string(json.dumps(args))
|
|
2391
2474
|
start_time = time.time()
|
|
2392
2475
|
while True:
|
|
2393
|
-
rsp = client.
|
|
2476
|
+
rsp = client.CreateAutoSnapshotPolicy(model)
|
|
2394
2477
|
result = rsp.to_json_string()
|
|
2395
2478
|
try:
|
|
2396
2479
|
json_obj = json.loads(result)
|
|
@@ -2419,7 +2502,10 @@ def doDescribeAutoSnapshotPolicies(args, parsed_globals):
|
|
|
2419
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2504
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2510
|
else:
|
|
2425
2511
|
cred = credential.Credential(
|
|
@@ -2431,7 +2517,7 @@ def doDescribeAutoSnapshotPolicies(args, parsed_globals):
|
|
|
2431
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2519
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2521
|
if g_param[OptionsDefine.Language]:
|
|
2436
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2557,10 @@ def doDeleteAutoSnapshotPolicy(args, parsed_globals):
|
|
|
2471
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2559
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2565
|
else:
|
|
2477
2566
|
cred = credential.Credential(
|
|
@@ -2483,7 +2572,7 @@ def doDeleteAutoSnapshotPolicy(args, parsed_globals):
|
|
|
2483
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2574
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2576
|
if g_param[OptionsDefine.Language]:
|
|
2488
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2612,10 @@ def doStopLifecycleDataTask(args, parsed_globals):
|
|
|
2523
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2614
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2620
|
else:
|
|
2529
2621
|
cred = credential.Credential(
|
|
@@ -2535,7 +2627,7 @@ def doStopLifecycleDataTask(args, parsed_globals):
|
|
|
2535
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2629
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2631
|
if g_param[OptionsDefine.Language]:
|
|
2540
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2667,10 @@ def doUnbindAutoSnapshotPolicy(args, parsed_globals):
|
|
|
2575
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2669
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2675
|
else:
|
|
2581
2676
|
cred = credential.Credential(
|
|
@@ -2587,7 +2682,7 @@ def doUnbindAutoSnapshotPolicy(args, parsed_globals):
|
|
|
2587
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2684
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2686
|
if g_param[OptionsDefine.Language]:
|
|
2592
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2722,10 @@ def doUpdateAutoSnapshotPolicy(args, parsed_globals):
|
|
|
2627
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2724
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2730
|
else:
|
|
2633
2731
|
cred = credential.Credential(
|
|
@@ -2639,7 +2737,7 @@ def doUpdateAutoSnapshotPolicy(args, parsed_globals):
|
|
|
2639
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2739
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2741
|
if g_param[OptionsDefine.Language]:
|
|
2644
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2777,10 @@ def doCreateCfsSnapshot(args, parsed_globals):
|
|
|
2679
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2779
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2785
|
else:
|
|
2685
2786
|
cred = credential.Credential(
|
|
@@ -2691,7 +2792,7 @@ def doCreateCfsSnapshot(args, parsed_globals):
|
|
|
2691
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2794
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2796
|
if g_param[OptionsDefine.Language]:
|
|
2696
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +2832,10 @@ def doDescribeSnapshotOperationLogs(args, parsed_globals):
|
|
|
2731
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2834
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2840
|
else:
|
|
2737
2841
|
cred = credential.Credential(
|
|
@@ -2743,7 +2847,7 @@ def doDescribeSnapshotOperationLogs(args, parsed_globals):
|
|
|
2743
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2849
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2851
|
if g_param[OptionsDefine.Language]:
|
|
2748
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +2887,10 @@ def doUpdateCfsFileSystemName(args, parsed_globals):
|
|
|
2783
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
2889
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
2895
|
else:
|
|
2789
2896
|
cred = credential.Credential(
|
|
@@ -2795,7 +2902,7 @@ def doUpdateCfsFileSystemName(args, parsed_globals):
|
|
|
2795
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
2904
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
2906
|
if g_param[OptionsDefine.Language]:
|
|
2800
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +2942,10 @@ def doDescribeDataFlow(args, parsed_globals):
|
|
|
2835
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
2944
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
2950
|
else:
|
|
2841
2951
|
cred = credential.Credential(
|
|
@@ -2847,7 +2957,7 @@ def doDescribeDataFlow(args, parsed_globals):
|
|
|
2847
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
2959
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
2961
|
if g_param[OptionsDefine.Language]:
|
|
2852
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +2997,10 @@ def doCreateCfsRule(args, parsed_globals):
|
|
|
2887
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
2999
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3005
|
else:
|
|
2893
3006
|
cred = credential.Credential(
|
|
@@ -2899,7 +3012,7 @@ def doCreateCfsRule(args, parsed_globals):
|
|
|
2899
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3014
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3016
|
if g_param[OptionsDefine.Language]:
|
|
2904
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3052,10 @@ def doUpdateCfsRule(args, parsed_globals):
|
|
|
2939
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3054
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3060
|
else:
|
|
2945
3061
|
cred = credential.Credential(
|
|
@@ -2951,7 +3067,7 @@ def doUpdateCfsRule(args, parsed_globals):
|
|
|
2951
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3069
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3071
|
if g_param[OptionsDefine.Language]:
|
|
2956
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3107,10 @@ def doUpdateCfsPGroup(args, parsed_globals):
|
|
|
2991
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3109
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3115
|
else:
|
|
2997
3116
|
cred = credential.Credential(
|
|
@@ -3003,7 +3122,7 @@ def doUpdateCfsPGroup(args, parsed_globals):
|
|
|
3003
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3124
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3126
|
if g_param[OptionsDefine.Language]:
|
|
3008
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3054,6 +3173,7 @@ ACTION_MAP = {
|
|
|
3054
3173
|
"CreateCfsPGroup": doCreateCfsPGroup,
|
|
3055
3174
|
"BindAutoSnapshotPolicy": doBindAutoSnapshotPolicy,
|
|
3056
3175
|
"CreateDataFlow": doCreateDataFlow,
|
|
3176
|
+
"DeleteUserQuota": doDeleteUserQuota,
|
|
3057
3177
|
"DeleteCfsPGroup": doDeleteCfsPGroup,
|
|
3058
3178
|
"DeleteLifecyclePolicy": doDeleteLifecyclePolicy,
|
|
3059
3179
|
"CreateLifecyclePolicyDownloadTask": doCreateLifecyclePolicyDownloadTask,
|
|
@@ -3065,7 +3185,6 @@ ACTION_MAP = {
|
|
|
3065
3185
|
"CreateLifecycleDataTask": doCreateLifecycleDataTask,
|
|
3066
3186
|
"ScaleUpFileSystem": doScaleUpFileSystem,
|
|
3067
3187
|
"SignUpCfsService": doSignUpCfsService,
|
|
3068
|
-
"CreateAutoSnapshotPolicy": doCreateAutoSnapshotPolicy,
|
|
3069
3188
|
"DeleteMigrationTask": doDeleteMigrationTask,
|
|
3070
3189
|
"UpdateFileSystemBandwidthLimit": doUpdateFileSystemBandwidthLimit,
|
|
3071
3190
|
"UpdateCfsFileSystemSizeLimit": doUpdateCfsFileSystemSizeLimit,
|
|
@@ -3088,8 +3207,7 @@ ACTION_MAP = {
|
|
|
3088
3207
|
"DescribeCfsFileSystemClients": doDescribeCfsFileSystemClients,
|
|
3089
3208
|
"DescribeBucketList": doDescribeBucketList,
|
|
3090
3209
|
"CreateMigrationTask": doCreateMigrationTask,
|
|
3091
|
-
"
|
|
3092
|
-
"DeleteUserQuota": doDeleteUserQuota,
|
|
3210
|
+
"CreateAutoSnapshotPolicy": doCreateAutoSnapshotPolicy,
|
|
3093
3211
|
"DescribeAutoSnapshotPolicies": doDescribeAutoSnapshotPolicies,
|
|
3094
3212
|
"DeleteAutoSnapshotPolicy": doDeleteAutoSnapshotPolicy,
|
|
3095
3213
|
"StopLifecycleDataTask": doStopLifecycleDataTask,
|