tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/cfw/cfw_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doRemoveVpcAcRule(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doRemoveVpcAcRule(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDeleteBlockIgnoreRuleNew(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDeleteBlockIgnoreRuleNew(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doDescribeVpcFwGroupSwitch(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doDescribeVpcFwGroupSwitch(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doModifyEWRuleStatus(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doModifyEWRuleStatus(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doStopSecurityGroupRuleDispatch(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doStopSecurityGroupRuleDispatch(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doModifyResourceGroup(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doModifyResourceGroup(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doDescribeResourceGroupNew(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doDescribeResourceGroupNew(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doModifyVpcFwGroup(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doModifyVpcFwGroup(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doModifyAssetSync(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doModifyAssetSync(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +522,10 @@ def doModifySecurityGroupRule(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,7 +537,7 @@ def doModifySecurityGroupRule(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +577,10 @@ def doAddVpcAcRule(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,7 +592,7 @@ def doAddVpcAcRule(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +632,10 @@ def doAddEnterpriseSecurityGroupRules(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,7 +647,7 @@ def doAddEnterpriseSecurityGroupRules(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +687,10 @@ def doDescribeTableStatus(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,7 +702,7 @@ def doDescribeTableStatus(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +742,10 @@ def doModifySecurityGroupSequenceRules(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,7 +757,7 @@ def doModifySecurityGroupSequenceRules(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +797,10 @@ def doRemoveEnterpriseSecurityGroupRule(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,7 +812,7 @@ def doRemoveEnterpriseSecurityGroupRule(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +852,10 @@ def doModifyNatSequenceRules(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,7 +867,7 @@ def doModifyNatSequenceRules(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +907,10 @@ def doDescribeUnHandleEventTabList(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,7 +922,7 @@ def doDescribeUnHandleEventTabList(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +962,10 @@ def doCreateNatFwInstance(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,7 +977,7 @@ def doCreateNatFwInstance(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1017,10 @@ def doModifyBlockTop(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,7 +1032,7 @@ def doModifyBlockTop(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1072,10 @@ def doDeleteRemoteAccessDomain(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,7 +1087,7 @@ def doDeleteRemoteAccessDomain(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1127,10 @@ def doRemoveAclRule(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,7 +1142,7 @@ def doRemoveAclRule(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1109,6 +1172,61 @@ def doRemoveAclRule(args, parsed_globals):
|
|
|
1109
1172
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1173
|
|
|
1111
1174
|
|
|
1175
|
+
def doDeleteNatFwInstance(args, parsed_globals):
|
|
1176
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1177
|
+
|
|
1178
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1179
|
+
cred = credential.CVMRoleCredential()
|
|
1180
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1181
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1182
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1183
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1184
|
+
)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1189
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1190
|
+
else:
|
|
1191
|
+
cred = credential.Credential(
|
|
1192
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1193
|
+
)
|
|
1194
|
+
http_profile = HttpProfile(
|
|
1195
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1196
|
+
reqMethod="POST",
|
|
1197
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1198
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1199
|
+
)
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1201
|
+
if g_param[OptionsDefine.Language]:
|
|
1202
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1203
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1204
|
+
client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1205
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1206
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1207
|
+
model = models.DeleteNatFwInstanceRequest()
|
|
1208
|
+
model.from_json_string(json.dumps(args))
|
|
1209
|
+
start_time = time.time()
|
|
1210
|
+
while True:
|
|
1211
|
+
rsp = client.DeleteNatFwInstance(model)
|
|
1212
|
+
result = rsp.to_json_string()
|
|
1213
|
+
try:
|
|
1214
|
+
json_obj = json.loads(result)
|
|
1215
|
+
except TypeError as e:
|
|
1216
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1217
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1218
|
+
break
|
|
1219
|
+
cur_time = time.time()
|
|
1220
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1221
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1222
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1223
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1224
|
+
else:
|
|
1225
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1226
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1227
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1228
|
+
|
|
1229
|
+
|
|
1112
1230
|
def doCreateBlockIgnoreRuleList(args, parsed_globals):
|
|
1113
1231
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1232
|
|
|
@@ -1119,7 +1237,10 @@ def doCreateBlockIgnoreRuleList(args, parsed_globals):
|
|
|
1119
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1239
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1245
|
else:
|
|
1125
1246
|
cred = credential.Credential(
|
|
@@ -1131,7 +1252,7 @@ def doCreateBlockIgnoreRuleList(args, parsed_globals):
|
|
|
1131
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1254
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1256
|
if g_param[OptionsDefine.Language]:
|
|
1136
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1292,10 @@ def doModifyBlockIgnoreRuleNew(args, parsed_globals):
|
|
|
1171
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1294
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1300
|
else:
|
|
1177
1301
|
cred = credential.Credential(
|
|
@@ -1183,7 +1307,7 @@ def doModifyBlockIgnoreRuleNew(args, parsed_globals):
|
|
|
1183
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1309
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1311
|
if g_param[OptionsDefine.Language]:
|
|
1188
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1347,10 @@ def doModifyEdgeIpSwitch(args, parsed_globals):
|
|
|
1223
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1349
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1355
|
else:
|
|
1229
1356
|
cred = credential.Credential(
|
|
@@ -1235,7 +1362,7 @@ def doModifyEdgeIpSwitch(args, parsed_globals):
|
|
|
1235
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1364
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1366
|
if g_param[OptionsDefine.Language]:
|
|
1240
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1402,10 @@ def doDescribeBlockByIpTimesList(args, parsed_globals):
|
|
|
1275
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1404
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1410
|
else:
|
|
1281
1411
|
cred = credential.Credential(
|
|
@@ -1287,7 +1417,7 @@ def doDescribeBlockByIpTimesList(args, parsed_globals):
|
|
|
1287
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1419
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1421
|
if g_param[OptionsDefine.Language]:
|
|
1292
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1457,10 @@ def doDescribeNatFwDnatRule(args, parsed_globals):
|
|
|
1327
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1459
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1465
|
else:
|
|
1333
1466
|
cred = credential.Credential(
|
|
@@ -1339,7 +1472,7 @@ def doDescribeNatFwDnatRule(args, parsed_globals):
|
|
|
1339
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1474
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1476
|
if g_param[OptionsDefine.Language]:
|
|
1344
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1512,10 @@ def doDescribeEnterpriseSGRuleProgress(args, parsed_globals):
|
|
|
1379
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1514
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1520
|
else:
|
|
1385
1521
|
cred = credential.Credential(
|
|
@@ -1391,7 +1527,7 @@ def doDescribeEnterpriseSGRuleProgress(args, parsed_globals):
|
|
|
1391
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1529
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1531
|
if g_param[OptionsDefine.Language]:
|
|
1396
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1567,10 @@ def doDescribeNatFwInfoCount(args, parsed_globals):
|
|
|
1431
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1569
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1575
|
else:
|
|
1437
1576
|
cred = credential.Credential(
|
|
@@ -1443,7 +1582,7 @@ def doDescribeNatFwInfoCount(args, parsed_globals):
|
|
|
1443
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1584
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1586
|
if g_param[OptionsDefine.Language]:
|
|
1448
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1622,10 @@ def doDescribeNatFwVpcDnsLst(args, parsed_globals):
|
|
|
1483
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1624
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1630
|
else:
|
|
1489
1631
|
cred = credential.Credential(
|
|
@@ -1495,7 +1637,7 @@ def doDescribeNatFwVpcDnsLst(args, parsed_globals):
|
|
|
1495
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1639
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1641
|
if g_param[OptionsDefine.Language]:
|
|
1500
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1677,10 @@ def doModifyBlockIgnoreRule(args, parsed_globals):
|
|
|
1535
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1679
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1685
|
else:
|
|
1541
1686
|
cred = credential.Credential(
|
|
@@ -1547,7 +1692,7 @@ def doModifyBlockIgnoreRule(args, parsed_globals):
|
|
|
1547
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1694
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1696
|
if g_param[OptionsDefine.Language]:
|
|
1552
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1732,10 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
1587
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1734
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1740
|
else:
|
|
1593
1741
|
cred = credential.Credential(
|
|
@@ -1599,7 +1747,7 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
1599
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1749
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1751
|
if g_param[OptionsDefine.Language]:
|
|
1604
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1787,10 @@ def doDescribeNatFwInstance(args, parsed_globals):
|
|
|
1639
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1789
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1795
|
else:
|
|
1645
1796
|
cred = credential.Credential(
|
|
@@ -1651,7 +1802,7 @@ def doDescribeNatFwInstance(args, parsed_globals):
|
|
|
1651
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1804
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1806
|
if g_param[OptionsDefine.Language]:
|
|
1656
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1842,10 @@ def doDeleteVpcFwGroup(args, parsed_globals):
|
|
|
1691
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1844
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1850
|
else:
|
|
1697
1851
|
cred = credential.Credential(
|
|
@@ -1703,7 +1857,7 @@ def doDeleteVpcFwGroup(args, parsed_globals):
|
|
|
1703
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1859
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1861
|
if g_param[OptionsDefine.Language]:
|
|
1708
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +1897,10 @@ def doDeleteAllAccessControlRule(args, parsed_globals):
|
|
|
1743
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1899
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1905
|
else:
|
|
1749
1906
|
cred = credential.Credential(
|
|
@@ -1755,7 +1912,7 @@ def doDeleteAllAccessControlRule(args, parsed_globals):
|
|
|
1755
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1914
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1916
|
if g_param[OptionsDefine.Language]:
|
|
1760
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +1952,10 @@ def doDescribeSecurityGroupList(args, parsed_globals):
|
|
|
1795
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1954
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1960
|
else:
|
|
1801
1961
|
cred = credential.Credential(
|
|
@@ -1807,7 +1967,7 @@ def doDescribeSecurityGroupList(args, parsed_globals):
|
|
|
1807
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1969
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1971
|
if g_param[OptionsDefine.Language]:
|
|
1812
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +2007,10 @@ def doModifyVpcAcRule(args, parsed_globals):
|
|
|
1847
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2009
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2015
|
else:
|
|
1853
2016
|
cred = credential.Credential(
|
|
@@ -1859,7 +2022,7 @@ def doModifyVpcAcRule(args, parsed_globals):
|
|
|
1859
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2024
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2026
|
if g_param[OptionsDefine.Language]:
|
|
1864
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1889,7 +2052,7 @@ def doModifyVpcAcRule(args, parsed_globals):
|
|
|
1889
2052
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
2053
|
|
|
1891
2054
|
|
|
1892
|
-
def
|
|
2055
|
+
def doDescribeAssetSync(args, parsed_globals):
|
|
1893
2056
|
g_param = parse_global_arg(parsed_globals)
|
|
1894
2057
|
|
|
1895
2058
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1899,7 +2062,10 @@ def doDeleteNatFwInstance(args, parsed_globals):
|
|
|
1899
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2064
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2070
|
else:
|
|
1905
2071
|
cred = credential.Credential(
|
|
@@ -1911,18 +2077,18 @@ def doDeleteNatFwInstance(args, parsed_globals):
|
|
|
1911
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2079
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2081
|
if g_param[OptionsDefine.Language]:
|
|
1916
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1918
2084
|
client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1919
2085
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1920
2086
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1921
|
-
model = models.
|
|
2087
|
+
model = models.DescribeAssetSyncRequest()
|
|
1922
2088
|
model.from_json_string(json.dumps(args))
|
|
1923
2089
|
start_time = time.time()
|
|
1924
2090
|
while True:
|
|
1925
|
-
rsp = client.
|
|
2091
|
+
rsp = client.DescribeAssetSync(model)
|
|
1926
2092
|
result = rsp.to_json_string()
|
|
1927
2093
|
try:
|
|
1928
2094
|
json_obj = json.loads(result)
|
|
@@ -1951,7 +2117,10 @@ def doCreateSecurityGroupRules(args, parsed_globals):
|
|
|
1951
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2119
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2125
|
else:
|
|
1957
2126
|
cred = credential.Credential(
|
|
@@ -1963,7 +2132,7 @@ def doCreateSecurityGroupRules(args, parsed_globals):
|
|
|
1963
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2134
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2136
|
if g_param[OptionsDefine.Language]:
|
|
1968
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2172,10 @@ def doDescribeDefenseSwitch(args, parsed_globals):
|
|
|
2003
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2174
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2180
|
else:
|
|
2009
2181
|
cred = credential.Credential(
|
|
@@ -2015,7 +2187,7 @@ def doDescribeDefenseSwitch(args, parsed_globals):
|
|
|
2015
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2189
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2191
|
if g_param[OptionsDefine.Language]:
|
|
2020
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2227,10 @@ def doDescribeFwGroupInstanceInfo(args, parsed_globals):
|
|
|
2055
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2229
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2235
|
else:
|
|
2061
2236
|
cred = credential.Credential(
|
|
@@ -2067,7 +2242,7 @@ def doDescribeFwGroupInstanceInfo(args, parsed_globals):
|
|
|
2067
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2244
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2246
|
if g_param[OptionsDefine.Language]:
|
|
2072
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2282,10 @@ def doModifyNatFwVpcDnsSwitch(args, parsed_globals):
|
|
|
2107
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2284
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2290
|
else:
|
|
2113
2291
|
cred = credential.Credential(
|
|
@@ -2119,7 +2297,7 @@ def doModifyNatFwVpcDnsSwitch(args, parsed_globals):
|
|
|
2119
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2299
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2301
|
if g_param[OptionsDefine.Language]:
|
|
2124
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2337,10 @@ def doModifySecurityGroupItemRuleStatus(args, parsed_globals):
|
|
|
2159
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2339
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2345
|
else:
|
|
2165
2346
|
cred = credential.Credential(
|
|
@@ -2171,7 +2352,7 @@ def doModifySecurityGroupItemRuleStatus(args, parsed_globals):
|
|
|
2171
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2354
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2356
|
if g_param[OptionsDefine.Language]:
|
|
2176
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2392,10 @@ def doDescribeNatFwInstanceWithRegion(args, parsed_globals):
|
|
|
2211
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2394
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2400
|
else:
|
|
2217
2401
|
cred = credential.Credential(
|
|
@@ -2223,7 +2407,7 @@ def doDescribeNatFwInstanceWithRegion(args, parsed_globals):
|
|
|
2223
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2409
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2411
|
if g_param[OptionsDefine.Language]:
|
|
2228
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2447,10 @@ def doCreateBlockIgnoreRuleNew(args, parsed_globals):
|
|
|
2263
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2449
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2455
|
else:
|
|
2269
2456
|
cred = credential.Credential(
|
|
@@ -2275,7 +2462,7 @@ def doCreateBlockIgnoreRuleNew(args, parsed_globals):
|
|
|
2275
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2464
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2466
|
if g_param[OptionsDefine.Language]:
|
|
2280
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2502,10 @@ def doDescribeSourceAsset(args, parsed_globals):
|
|
|
2315
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2504
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2510
|
else:
|
|
2321
2511
|
cred = credential.Credential(
|
|
@@ -2327,7 +2517,7 @@ def doDescribeSourceAsset(args, parsed_globals):
|
|
|
2327
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2519
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2521
|
if g_param[OptionsDefine.Language]:
|
|
2332
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2557,10 @@ def doDeleteResourceGroup(args, parsed_globals):
|
|
|
2367
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2559
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2565
|
else:
|
|
2373
2566
|
cred = credential.Credential(
|
|
@@ -2379,7 +2572,7 @@ def doDeleteResourceGroup(args, parsed_globals):
|
|
|
2379
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2574
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2576
|
if g_param[OptionsDefine.Language]:
|
|
2384
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2409,7 +2602,7 @@ def doDeleteResourceGroup(args, parsed_globals):
|
|
|
2409
2602
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2410
2603
|
|
|
2411
2604
|
|
|
2412
|
-
def
|
|
2605
|
+
def doDescribeNatFwSwitch(args, parsed_globals):
|
|
2413
2606
|
g_param = parse_global_arg(parsed_globals)
|
|
2414
2607
|
|
|
2415
2608
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2419,7 +2612,10 @@ def doRemoveAcRule(args, parsed_globals):
|
|
|
2419
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2614
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2620
|
else:
|
|
2425
2621
|
cred = credential.Credential(
|
|
@@ -2431,18 +2627,18 @@ def doRemoveAcRule(args, parsed_globals):
|
|
|
2431
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2629
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2631
|
if g_param[OptionsDefine.Language]:
|
|
2436
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2438
2634
|
client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2439
2635
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2440
2636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2441
|
-
model = models.
|
|
2637
|
+
model = models.DescribeNatFwSwitchRequest()
|
|
2442
2638
|
model.from_json_string(json.dumps(args))
|
|
2443
2639
|
start_time = time.time()
|
|
2444
2640
|
while True:
|
|
2445
|
-
rsp = client.
|
|
2641
|
+
rsp = client.DescribeNatFwSwitch(model)
|
|
2446
2642
|
result = rsp.to_json_string()
|
|
2447
2643
|
try:
|
|
2448
2644
|
json_obj = json.loads(result)
|
|
@@ -2471,7 +2667,10 @@ def doModifyVpcFwSequenceRules(args, parsed_globals):
|
|
|
2471
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2669
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2675
|
else:
|
|
2477
2676
|
cred = credential.Credential(
|
|
@@ -2483,7 +2682,7 @@ def doModifyVpcFwSequenceRules(args, parsed_globals):
|
|
|
2483
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2684
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2686
|
if g_param[OptionsDefine.Language]:
|
|
2488
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2722,10 @@ def doCreateAlertCenterOmit(args, parsed_globals):
|
|
|
2523
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2724
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2730
|
else:
|
|
2529
2731
|
cred = credential.Credential(
|
|
@@ -2535,7 +2737,7 @@ def doCreateAlertCenterOmit(args, parsed_globals):
|
|
|
2535
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2739
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2741
|
if g_param[OptionsDefine.Language]:
|
|
2540
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2565,6 +2767,61 @@ def doCreateAlertCenterOmit(args, parsed_globals):
|
|
|
2565
2767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2566
2768
|
|
|
2567
2769
|
|
|
2770
|
+
def doRemoveAcRule(args, parsed_globals):
|
|
2771
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2772
|
+
|
|
2773
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2774
|
+
cred = credential.CVMRoleCredential()
|
|
2775
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2776
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2777
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2778
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2779
|
+
)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2784
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2785
|
+
else:
|
|
2786
|
+
cred = credential.Credential(
|
|
2787
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2788
|
+
)
|
|
2789
|
+
http_profile = HttpProfile(
|
|
2790
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2791
|
+
reqMethod="POST",
|
|
2792
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2793
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2794
|
+
)
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2796
|
+
if g_param[OptionsDefine.Language]:
|
|
2797
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2798
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2799
|
+
client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2800
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2801
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2802
|
+
model = models.RemoveAcRuleRequest()
|
|
2803
|
+
model.from_json_string(json.dumps(args))
|
|
2804
|
+
start_time = time.time()
|
|
2805
|
+
while True:
|
|
2806
|
+
rsp = client.RemoveAcRule(model)
|
|
2807
|
+
result = rsp.to_json_string()
|
|
2808
|
+
try:
|
|
2809
|
+
json_obj = json.loads(result)
|
|
2810
|
+
except TypeError as e:
|
|
2811
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2812
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2813
|
+
break
|
|
2814
|
+
cur_time = time.time()
|
|
2815
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2816
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2817
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2818
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2819
|
+
else:
|
|
2820
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2821
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2822
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2823
|
+
|
|
2824
|
+
|
|
2568
2825
|
def doDescribeVpcAcRule(args, parsed_globals):
|
|
2569
2826
|
g_param = parse_global_arg(parsed_globals)
|
|
2570
2827
|
|
|
@@ -2575,7 +2832,10 @@ def doDescribeVpcAcRule(args, parsed_globals):
|
|
|
2575
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2834
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2840
|
else:
|
|
2581
2841
|
cred = credential.Credential(
|
|
@@ -2587,7 +2847,7 @@ def doDescribeVpcAcRule(args, parsed_globals):
|
|
|
2587
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2849
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2851
|
if g_param[OptionsDefine.Language]:
|
|
2592
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2887,10 @@ def doModifyEnterpriseSecurityGroupRule(args, parsed_globals):
|
|
|
2627
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2889
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2895
|
else:
|
|
2633
2896
|
cred = credential.Credential(
|
|
@@ -2639,7 +2902,7 @@ def doModifyEnterpriseSecurityGroupRule(args, parsed_globals):
|
|
|
2639
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2904
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2906
|
if g_param[OptionsDefine.Language]:
|
|
2644
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2942,10 @@ def doAddAclRule(args, parsed_globals):
|
|
|
2679
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2944
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2950
|
else:
|
|
2685
2951
|
cred = credential.Credential(
|
|
@@ -2691,7 +2957,7 @@ def doAddAclRule(args, parsed_globals):
|
|
|
2691
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2959
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2961
|
if g_param[OptionsDefine.Language]:
|
|
2696
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +2997,10 @@ def doModifyNatAcRule(args, parsed_globals):
|
|
|
2731
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2999
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3005
|
else:
|
|
2737
3006
|
cred = credential.Credential(
|
|
@@ -2743,7 +3012,7 @@ def doModifyNatAcRule(args, parsed_globals):
|
|
|
2743
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3014
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3016
|
if g_param[OptionsDefine.Language]:
|
|
2748
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +3052,10 @@ def doDeleteSecurityGroupRule(args, parsed_globals):
|
|
|
2783
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3054
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3060
|
else:
|
|
2789
3061
|
cred = credential.Credential(
|
|
@@ -2795,7 +3067,7 @@ def doDeleteSecurityGroupRule(args, parsed_globals):
|
|
|
2795
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3069
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3071
|
if g_param[OptionsDefine.Language]:
|
|
2800
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +3107,10 @@ def doModifyAddressTemplate(args, parsed_globals):
|
|
|
2835
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3109
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3115
|
else:
|
|
2841
3116
|
cred = credential.Credential(
|
|
@@ -2847,7 +3122,7 @@ def doModifyAddressTemplate(args, parsed_globals):
|
|
|
2847
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3124
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3126
|
if g_param[OptionsDefine.Language]:
|
|
2852
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +3162,10 @@ def doDescribeSwitchLists(args, parsed_globals):
|
|
|
2887
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3164
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3170
|
else:
|
|
2893
3171
|
cred = credential.Credential(
|
|
@@ -2899,7 +3177,7 @@ def doDescribeSwitchLists(args, parsed_globals):
|
|
|
2899
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3179
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3181
|
if g_param[OptionsDefine.Language]:
|
|
2904
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3217,10 @@ def doModifyTableStatus(args, parsed_globals):
|
|
|
2939
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3219
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3225
|
else:
|
|
2945
3226
|
cred = credential.Credential(
|
|
@@ -2951,7 +3232,7 @@ def doModifyTableStatus(args, parsed_globals):
|
|
|
2951
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3234
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3236
|
if g_param[OptionsDefine.Language]:
|
|
2956
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3272,10 @@ def doCreateAlertCenterIsolate(args, parsed_globals):
|
|
|
2991
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3274
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3280
|
else:
|
|
2997
3281
|
cred = credential.Credential(
|
|
@@ -3003,7 +3287,7 @@ def doCreateAlertCenterIsolate(args, parsed_globals):
|
|
|
3003
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3289
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3291
|
if g_param[OptionsDefine.Language]:
|
|
3008
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3327,10 @@ def doModifyBlockIgnoreList(args, parsed_globals):
|
|
|
3043
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3329
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3335
|
else:
|
|
3049
3336
|
cred = credential.Credential(
|
|
@@ -3055,7 +3342,7 @@ def doModifyBlockIgnoreList(args, parsed_globals):
|
|
|
3055
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3344
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3346
|
if g_param[OptionsDefine.Language]:
|
|
3060
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3382,10 @@ def doCreateChooseVpcs(args, parsed_globals):
|
|
|
3095
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3384
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3390
|
else:
|
|
3101
3391
|
cred = credential.Credential(
|
|
@@ -3107,7 +3397,7 @@ def doCreateChooseVpcs(args, parsed_globals):
|
|
|
3107
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3399
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3401
|
if g_param[OptionsDefine.Language]:
|
|
3112
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3437,10 @@ def doModifyAssetScan(args, parsed_globals):
|
|
|
3147
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3439
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3445
|
else:
|
|
3153
3446
|
cred = credential.Credential(
|
|
@@ -3159,7 +3452,7 @@ def doModifyAssetScan(args, parsed_globals):
|
|
|
3159
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3454
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3456
|
if g_param[OptionsDefine.Language]:
|
|
3164
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3492,10 @@ def doDeleteAddressTemplate(args, parsed_globals):
|
|
|
3199
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3494
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3500
|
else:
|
|
3205
3501
|
cred = credential.Credential(
|
|
@@ -3211,7 +3507,7 @@ def doDeleteAddressTemplate(args, parsed_globals):
|
|
|
3211
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3509
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3511
|
if g_param[OptionsDefine.Language]:
|
|
3216
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3547,10 @@ def doModifySequenceRules(args, parsed_globals):
|
|
|
3251
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3549
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3555
|
else:
|
|
3257
3556
|
cred = credential.Credential(
|
|
@@ -3263,7 +3562,7 @@ def doModifySequenceRules(args, parsed_globals):
|
|
|
3263
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3564
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3566
|
if g_param[OptionsDefine.Language]:
|
|
3268
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3602,10 @@ def doModifySequenceAclRules(args, parsed_globals):
|
|
|
3303
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3604
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3610
|
else:
|
|
3309
3611
|
cred = credential.Credential(
|
|
@@ -3315,7 +3617,7 @@ def doModifySequenceAclRules(args, parsed_globals):
|
|
|
3315
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3619
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3621
|
if g_param[OptionsDefine.Language]:
|
|
3320
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3657,10 @@ def doDescribeRuleOverview(args, parsed_globals):
|
|
|
3355
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3659
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3665
|
else:
|
|
3361
3666
|
cred = credential.Credential(
|
|
@@ -3367,7 +3672,7 @@ def doDescribeRuleOverview(args, parsed_globals):
|
|
|
3367
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3674
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3676
|
if g_param[OptionsDefine.Language]:
|
|
3372
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3712,10 @@ def doDescribeIPStatusList(args, parsed_globals):
|
|
|
3407
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3714
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3720
|
else:
|
|
3413
3721
|
cred = credential.Credential(
|
|
@@ -3419,7 +3727,7 @@ def doDescribeIPStatusList(args, parsed_globals):
|
|
|
3419
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3729
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3731
|
if g_param[OptionsDefine.Language]:
|
|
3424
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3767,10 @@ def doDescribeCfwInsStatus(args, parsed_globals):
|
|
|
3459
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3769
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3775
|
else:
|
|
3465
3776
|
cred = credential.Credential(
|
|
@@ -3471,7 +3782,7 @@ def doDescribeCfwInsStatus(args, parsed_globals):
|
|
|
3471
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3784
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3786
|
if g_param[OptionsDefine.Language]:
|
|
3476
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +3822,10 @@ def doDescribeEnterpriseSecurityGroupRule(args, parsed_globals):
|
|
|
3511
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3824
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3830
|
else:
|
|
3517
3831
|
cred = credential.Credential(
|
|
@@ -3523,7 +3837,7 @@ def doDescribeEnterpriseSecurityGroupRule(args, parsed_globals):
|
|
|
3523
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3839
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3841
|
if g_param[OptionsDefine.Language]:
|
|
3528
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +3877,10 @@ def doModifyFwGroupSwitch(args, parsed_globals):
|
|
|
3563
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3879
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3885
|
else:
|
|
3569
3886
|
cred = credential.Credential(
|
|
@@ -3575,7 +3892,7 @@ def doModifyFwGroupSwitch(args, parsed_globals):
|
|
|
3575
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3894
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3896
|
if g_param[OptionsDefine.Language]:
|
|
3580
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +3932,10 @@ def doDescribeLogs(args, parsed_globals):
|
|
|
3615
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3934
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3940
|
else:
|
|
3621
3941
|
cred = credential.Credential(
|
|
@@ -3627,7 +3947,7 @@ def doDescribeLogs(args, parsed_globals):
|
|
|
3627
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
3949
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
3951
|
if g_param[OptionsDefine.Language]:
|
|
3632
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +3987,10 @@ def doSetNatFwDnatRule(args, parsed_globals):
|
|
|
3667
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
3989
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
3995
|
else:
|
|
3673
3996
|
cred = credential.Credential(
|
|
@@ -3679,7 +4002,7 @@ def doSetNatFwDnatRule(args, parsed_globals):
|
|
|
3679
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
4004
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
4006
|
if g_param[OptionsDefine.Language]:
|
|
3684
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +4042,10 @@ def doModifyAllRuleStatus(args, parsed_globals):
|
|
|
3719
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4044
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4050
|
else:
|
|
3725
4051
|
cred = credential.Credential(
|
|
@@ -3731,7 +4057,7 @@ def doModifyAllRuleStatus(args, parsed_globals):
|
|
|
3731
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4059
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4061
|
if g_param[OptionsDefine.Language]:
|
|
3736
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +4097,10 @@ def doDeleteBlockIgnoreRuleList(args, parsed_globals):
|
|
|
3771
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4099
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4105
|
else:
|
|
3777
4106
|
cred = credential.Credential(
|
|
@@ -3783,7 +4112,7 @@ def doDeleteBlockIgnoreRuleList(args, parsed_globals):
|
|
|
3783
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4114
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4116
|
if g_param[OptionsDefine.Language]:
|
|
3788
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +4152,10 @@ def doSetNatFwEip(args, parsed_globals):
|
|
|
3823
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4154
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4160
|
else:
|
|
3829
4161
|
cred = credential.Credential(
|
|
@@ -3835,7 +4167,7 @@ def doSetNatFwEip(args, parsed_globals):
|
|
|
3835
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4169
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4171
|
if g_param[OptionsDefine.Language]:
|
|
3840
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3875,7 +4207,10 @@ def doCreateAlertCenterRule(args, parsed_globals):
|
|
|
3875
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4209
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4215
|
else:
|
|
3881
4216
|
cred = credential.Credential(
|
|
@@ -3887,7 +4222,7 @@ def doCreateAlertCenterRule(args, parsed_globals):
|
|
|
3887
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4224
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4226
|
if g_param[OptionsDefine.Language]:
|
|
3892
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3927,7 +4262,10 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
3927
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4264
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4270
|
else:
|
|
3933
4271
|
cred = credential.Credential(
|
|
@@ -3939,7 +4277,7 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
3939
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4279
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4281
|
if g_param[OptionsDefine.Language]:
|
|
3944
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3979,7 +4317,10 @@ def doDescribeEnterpriseSecurityGroupRuleList(args, parsed_globals):
|
|
|
3979
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4319
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4325
|
else:
|
|
3985
4326
|
cred = credential.Credential(
|
|
@@ -3991,7 +4332,7 @@ def doDescribeEnterpriseSecurityGroupRuleList(args, parsed_globals):
|
|
|
3991
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4334
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4336
|
if g_param[OptionsDefine.Language]:
|
|
3996
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4031,7 +4372,10 @@ def doDescribeCfwEips(args, parsed_globals):
|
|
|
4031
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4374
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4380
|
else:
|
|
4037
4381
|
cred = credential.Credential(
|
|
@@ -4043,7 +4387,7 @@ def doDescribeCfwEips(args, parsed_globals):
|
|
|
4043
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4389
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4391
|
if g_param[OptionsDefine.Language]:
|
|
4048
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4083,7 +4427,10 @@ def doDescribeBlockIgnoreList(args, parsed_globals):
|
|
|
4083
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4429
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4435
|
else:
|
|
4089
4436
|
cred = credential.Credential(
|
|
@@ -4095,7 +4442,7 @@ def doDescribeBlockIgnoreList(args, parsed_globals):
|
|
|
4095
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4444
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4446
|
if g_param[OptionsDefine.Language]:
|
|
4100
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4135,7 +4482,10 @@ def doRemoveNatAcRule(args, parsed_globals):
|
|
|
4135
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4484
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4490
|
else:
|
|
4141
4491
|
cred = credential.Credential(
|
|
@@ -4147,7 +4497,7 @@ def doRemoveNatAcRule(args, parsed_globals):
|
|
|
4147
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4499
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4501
|
if g_param[OptionsDefine.Language]:
|
|
4152
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4177,7 +4527,7 @@ def doRemoveNatAcRule(args, parsed_globals):
|
|
|
4177
4527
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4178
4528
|
|
|
4179
4529
|
|
|
4180
|
-
def
|
|
4530
|
+
def doDescribeAcLists(args, parsed_globals):
|
|
4181
4531
|
g_param = parse_global_arg(parsed_globals)
|
|
4182
4532
|
|
|
4183
4533
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4187,7 +4537,10 @@ def doDescribeAssetSync(args, parsed_globals):
|
|
|
4187
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4539
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4545
|
else:
|
|
4193
4546
|
cred = credential.Credential(
|
|
@@ -4199,18 +4552,18 @@ def doDescribeAssetSync(args, parsed_globals):
|
|
|
4199
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4554
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4556
|
if g_param[OptionsDefine.Language]:
|
|
4204
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4206
4559
|
client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4207
4560
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4208
4561
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4209
|
-
model = models.
|
|
4562
|
+
model = models.DescribeAcListsRequest()
|
|
4210
4563
|
model.from_json_string(json.dumps(args))
|
|
4211
4564
|
start_time = time.time()
|
|
4212
4565
|
while True:
|
|
4213
|
-
rsp = client.
|
|
4566
|
+
rsp = client.DescribeAcLists(model)
|
|
4214
4567
|
result = rsp.to_json_string()
|
|
4215
4568
|
try:
|
|
4216
4569
|
json_obj = json.loads(result)
|
|
@@ -4239,7 +4592,10 @@ def doDescribeLogStorageStatistic(args, parsed_globals):
|
|
|
4239
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4594
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4600
|
else:
|
|
4245
4601
|
cred = credential.Credential(
|
|
@@ -4251,7 +4607,7 @@ def doDescribeLogStorageStatistic(args, parsed_globals):
|
|
|
4251
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4609
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4611
|
if g_param[OptionsDefine.Language]:
|
|
4256
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4291,7 +4647,10 @@ def doExpandCfwVertical(args, parsed_globals):
|
|
|
4291
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4649
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4655
|
else:
|
|
4297
4656
|
cred = credential.Credential(
|
|
@@ -4303,7 +4662,7 @@ def doExpandCfwVertical(args, parsed_globals):
|
|
|
4303
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4664
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4666
|
if g_param[OptionsDefine.Language]:
|
|
4308
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4343,7 +4702,10 @@ def doCreateVpcFwGroup(args, parsed_globals):
|
|
|
4343
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4704
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4710
|
else:
|
|
4349
4711
|
cred = credential.Credential(
|
|
@@ -4355,7 +4717,7 @@ def doCreateVpcFwGroup(args, parsed_globals):
|
|
|
4355
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4719
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4721
|
if g_param[OptionsDefine.Language]:
|
|
4360
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4395,7 +4757,10 @@ def doModifyAllPublicIPSwitchStatus(args, parsed_globals):
|
|
|
4395
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4759
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4765
|
else:
|
|
4401
4766
|
cred = credential.Credential(
|
|
@@ -4407,7 +4772,7 @@ def doModifyAllPublicIPSwitchStatus(args, parsed_globals):
|
|
|
4407
4772
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4773
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4774
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4776
|
if g_param[OptionsDefine.Language]:
|
|
4412
4777
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4778
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +4812,10 @@ def doDescribeAssociatedInstanceList(args, parsed_globals):
|
|
|
4447
4812
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4813
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4814
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4820
|
else:
|
|
4453
4821
|
cred = credential.Credential(
|
|
@@ -4459,7 +4827,7 @@ def doDescribeAssociatedInstanceList(args, parsed_globals):
|
|
|
4459
4827
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
4828
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
4829
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
4831
|
if g_param[OptionsDefine.Language]:
|
|
4464
4832
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
4833
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4499,7 +4867,10 @@ def doDeleteAcRule(args, parsed_globals):
|
|
|
4499
4867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4868
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4869
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4874
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4875
|
else:
|
|
4505
4876
|
cred = credential.Credential(
|
|
@@ -4511,7 +4882,7 @@ def doDeleteAcRule(args, parsed_globals):
|
|
|
4511
4882
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
4883
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
4884
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
4886
|
if g_param[OptionsDefine.Language]:
|
|
4516
4887
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
4888
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4551,7 +4922,10 @@ def doDescribeNatAcRule(args, parsed_globals):
|
|
|
4551
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
4924
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
4930
|
else:
|
|
4557
4931
|
cred = credential.Credential(
|
|
@@ -4563,7 +4937,7 @@ def doDescribeNatAcRule(args, parsed_globals):
|
|
|
4563
4937
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
4938
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
4939
|
)
|
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4567
4941
|
if g_param[OptionsDefine.Language]:
|
|
4568
4942
|
profile.language = g_param[OptionsDefine.Language]
|
|
4569
4943
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4603,7 +4977,10 @@ def doModifyNatInstance(args, parsed_globals):
|
|
|
4603
4977
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
4978
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
4979
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
4984
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
4985
|
else:
|
|
4609
4986
|
cred = credential.Credential(
|
|
@@ -4615,7 +4992,7 @@ def doModifyNatInstance(args, parsed_globals):
|
|
|
4615
4992
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4616
4993
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4617
4994
|
)
|
|
4618
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4619
4996
|
if g_param[OptionsDefine.Language]:
|
|
4620
4997
|
profile.language = g_param[OptionsDefine.Language]
|
|
4621
4998
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4655,7 +5032,10 @@ def doDescribeFwSyncStatus(args, parsed_globals):
|
|
|
4655
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
5034
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
5040
|
else:
|
|
4661
5041
|
cred = credential.Credential(
|
|
@@ -4667,7 +5047,7 @@ def doDescribeFwSyncStatus(args, parsed_globals):
|
|
|
4667
5047
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4668
5048
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4669
5049
|
)
|
|
4670
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4671
5051
|
if g_param[OptionsDefine.Language]:
|
|
4672
5052
|
profile.language = g_param[OptionsDefine.Language]
|
|
4673
5053
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4707,7 +5087,10 @@ def doCreateDatabaseWhiteListRules(args, parsed_globals):
|
|
|
4707
5087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4708
5088
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4709
5089
|
)
|
|
4710
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
5094
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
5095
|
else:
|
|
4713
5096
|
cred = credential.Credential(
|
|
@@ -4719,7 +5102,7 @@ def doCreateDatabaseWhiteListRules(args, parsed_globals):
|
|
|
4719
5102
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4720
5103
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4721
5104
|
)
|
|
4722
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4723
5106
|
if g_param[OptionsDefine.Language]:
|
|
4724
5107
|
profile.language = g_param[OptionsDefine.Language]
|
|
4725
5108
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4759,7 +5142,10 @@ def doCreateNatFwInstanceWithDomain(args, parsed_globals):
|
|
|
4759
5142
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
5143
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
5144
|
)
|
|
4762
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
5149
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
5150
|
else:
|
|
4765
5151
|
cred = credential.Credential(
|
|
@@ -4771,7 +5157,7 @@ def doCreateNatFwInstanceWithDomain(args, parsed_globals):
|
|
|
4771
5157
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4772
5158
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4773
5159
|
)
|
|
4774
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5160
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4775
5161
|
if g_param[OptionsDefine.Language]:
|
|
4776
5162
|
profile.language = g_param[OptionsDefine.Language]
|
|
4777
5163
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4811,7 +5197,10 @@ def doCreateAcRules(args, parsed_globals):
|
|
|
4811
5197
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4812
5198
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4813
5199
|
)
|
|
4814
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4815
5204
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4816
5205
|
else:
|
|
4817
5206
|
cred = credential.Credential(
|
|
@@ -4823,7 +5212,7 @@ def doCreateAcRules(args, parsed_globals):
|
|
|
4823
5212
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4824
5213
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4825
5214
|
)
|
|
4826
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5215
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4827
5216
|
if g_param[OptionsDefine.Language]:
|
|
4828
5217
|
profile.language = g_param[OptionsDefine.Language]
|
|
4829
5218
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4863,7 +5252,10 @@ def doModifyEnterpriseSecurityDispatchStatus(args, parsed_globals):
|
|
|
4863
5252
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4864
5253
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4865
5254
|
)
|
|
4866
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4867
5259
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4868
5260
|
else:
|
|
4869
5261
|
cred = credential.Credential(
|
|
@@ -4875,7 +5267,7 @@ def doModifyEnterpriseSecurityDispatchStatus(args, parsed_globals):
|
|
|
4875
5267
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4876
5268
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4877
5269
|
)
|
|
4878
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5270
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4879
5271
|
if g_param[OptionsDefine.Language]:
|
|
4880
5272
|
profile.language = g_param[OptionsDefine.Language]
|
|
4881
5273
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4915,7 +5307,10 @@ def doDescribeTLogInfo(args, parsed_globals):
|
|
|
4915
5307
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4916
5308
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4917
5309
|
)
|
|
4918
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5310
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5311
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5312
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4919
5314
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4920
5315
|
else:
|
|
4921
5316
|
cred = credential.Credential(
|
|
@@ -4927,7 +5322,7 @@ def doDescribeTLogInfo(args, parsed_globals):
|
|
|
4927
5322
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4928
5323
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4929
5324
|
)
|
|
4930
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5325
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4931
5326
|
if g_param[OptionsDefine.Language]:
|
|
4932
5327
|
profile.language = g_param[OptionsDefine.Language]
|
|
4933
5328
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4967,7 +5362,10 @@ def doModifyRunSyncAsset(args, parsed_globals):
|
|
|
4967
5362
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4968
5363
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4969
5364
|
)
|
|
4970
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5365
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5366
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5367
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4971
5369
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4972
5370
|
else:
|
|
4973
5371
|
cred = credential.Credential(
|
|
@@ -4979,7 +5377,7 @@ def doModifyRunSyncAsset(args, parsed_globals):
|
|
|
4979
5377
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4980
5378
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4981
5379
|
)
|
|
4982
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5380
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4983
5381
|
if g_param[OptionsDefine.Language]:
|
|
4984
5382
|
profile.language = g_param[OptionsDefine.Language]
|
|
4985
5383
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5019,7 +5417,10 @@ def doDescribeGuideScanInfo(args, parsed_globals):
|
|
|
5019
5417
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5020
5418
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5021
5419
|
)
|
|
5022
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5420
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5421
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5422
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5023
5424
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5024
5425
|
else:
|
|
5025
5426
|
cred = credential.Credential(
|
|
@@ -5031,7 +5432,7 @@ def doDescribeGuideScanInfo(args, parsed_globals):
|
|
|
5031
5432
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5032
5433
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5033
5434
|
)
|
|
5034
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5435
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5035
5436
|
if g_param[OptionsDefine.Language]:
|
|
5036
5437
|
profile.language = g_param[OptionsDefine.Language]
|
|
5037
5438
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5071,7 +5472,10 @@ def doDescribeAddressTemplateList(args, parsed_globals):
|
|
|
5071
5472
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5072
5473
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5073
5474
|
)
|
|
5074
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5475
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5476
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5477
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5075
5479
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5076
5480
|
else:
|
|
5077
5481
|
cred = credential.Credential(
|
|
@@ -5083,7 +5487,7 @@ def doDescribeAddressTemplateList(args, parsed_globals):
|
|
|
5083
5487
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5084
5488
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5085
5489
|
)
|
|
5086
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5490
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5087
5491
|
if g_param[OptionsDefine.Language]:
|
|
5088
5492
|
profile.language = g_param[OptionsDefine.Language]
|
|
5089
5493
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5123,7 +5527,10 @@ def doDescribeNatFwInstancesInfo(args, parsed_globals):
|
|
|
5123
5527
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5124
5528
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5125
5529
|
)
|
|
5126
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5530
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5531
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5532
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5127
5534
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5128
5535
|
else:
|
|
5129
5536
|
cred = credential.Credential(
|
|
@@ -5135,7 +5542,7 @@ def doDescribeNatFwInstancesInfo(args, parsed_globals):
|
|
|
5135
5542
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5136
5543
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5137
5544
|
)
|
|
5138
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5545
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5139
5546
|
if g_param[OptionsDefine.Language]:
|
|
5140
5547
|
profile.language = g_param[OptionsDefine.Language]
|
|
5141
5548
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5175,7 +5582,10 @@ def doModifyNatFwReSelect(args, parsed_globals):
|
|
|
5175
5582
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5176
5583
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5177
5584
|
)
|
|
5178
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5585
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5586
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5587
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5179
5589
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5180
5590
|
else:
|
|
5181
5591
|
cred = credential.Credential(
|
|
@@ -5187,7 +5597,7 @@ def doModifyNatFwReSelect(args, parsed_globals):
|
|
|
5187
5597
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5188
5598
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5189
5599
|
)
|
|
5190
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5600
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5191
5601
|
if g_param[OptionsDefine.Language]:
|
|
5192
5602
|
profile.language = g_param[OptionsDefine.Language]
|
|
5193
5603
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5227,7 +5637,10 @@ def doModifyStorageSetting(args, parsed_globals):
|
|
|
5227
5637
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5228
5638
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5229
5639
|
)
|
|
5230
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5640
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5641
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5642
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5231
5644
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5232
5645
|
else:
|
|
5233
5646
|
cred = credential.Credential(
|
|
@@ -5239,7 +5652,7 @@ def doModifyStorageSetting(args, parsed_globals):
|
|
|
5239
5652
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5240
5653
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5241
5654
|
)
|
|
5242
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5655
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5243
5656
|
if g_param[OptionsDefine.Language]:
|
|
5244
5657
|
profile.language = g_param[OptionsDefine.Language]
|
|
5245
5658
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5279,7 +5692,10 @@ def doSearchLog(args, parsed_globals):
|
|
|
5279
5692
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5280
5693
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5281
5694
|
)
|
|
5282
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5695
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5696
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5697
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5283
5699
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5284
5700
|
else:
|
|
5285
5701
|
cred = credential.Credential(
|
|
@@ -5291,7 +5707,7 @@ def doSearchLog(args, parsed_globals):
|
|
|
5291
5707
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5292
5708
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5293
5709
|
)
|
|
5294
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5710
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5295
5711
|
if g_param[OptionsDefine.Language]:
|
|
5296
5712
|
profile.language = g_param[OptionsDefine.Language]
|
|
5297
5713
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5331,7 +5747,10 @@ def doDescribeResourceGroup(args, parsed_globals):
|
|
|
5331
5747
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5332
5748
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5333
5749
|
)
|
|
5334
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5750
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5751
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5752
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5335
5754
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5336
5755
|
else:
|
|
5337
5756
|
cred = credential.Credential(
|
|
@@ -5343,7 +5762,7 @@ def doDescribeResourceGroup(args, parsed_globals):
|
|
|
5343
5762
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5344
5763
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5345
5764
|
)
|
|
5346
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5765
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5347
5766
|
if g_param[OptionsDefine.Language]:
|
|
5348
5767
|
profile.language = g_param[OptionsDefine.Language]
|
|
5349
5768
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5383,7 +5802,10 @@ def doSyncFwOperate(args, parsed_globals):
|
|
|
5383
5802
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5384
5803
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5385
5804
|
)
|
|
5386
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5805
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5806
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5807
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5387
5809
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5388
5810
|
else:
|
|
5389
5811
|
cred = credential.Credential(
|
|
@@ -5395,7 +5817,7 @@ def doSyncFwOperate(args, parsed_globals):
|
|
|
5395
5817
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5396
5818
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5397
5819
|
)
|
|
5398
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5820
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5399
5821
|
if g_param[OptionsDefine.Language]:
|
|
5400
5822
|
profile.language = g_param[OptionsDefine.Language]
|
|
5401
5823
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5435,7 +5857,10 @@ def doModifyAcRule(args, parsed_globals):
|
|
|
5435
5857
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5436
5858
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5437
5859
|
)
|
|
5438
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5860
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5861
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5862
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5439
5864
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5440
5865
|
else:
|
|
5441
5866
|
cred = credential.Credential(
|
|
@@ -5447,7 +5872,7 @@ def doModifyAcRule(args, parsed_globals):
|
|
|
5447
5872
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5448
5873
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5449
5874
|
)
|
|
5450
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5875
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5451
5876
|
if g_param[OptionsDefine.Language]:
|
|
5452
5877
|
profile.language = g_param[OptionsDefine.Language]
|
|
5453
5878
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5487,7 +5912,10 @@ def doModifyNatFwSwitch(args, parsed_globals):
|
|
|
5487
5912
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5488
5913
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5489
5914
|
)
|
|
5490
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5915
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5916
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5917
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5491
5919
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5492
5920
|
else:
|
|
5493
5921
|
cred = credential.Credential(
|
|
@@ -5499,7 +5927,7 @@ def doModifyNatFwSwitch(args, parsed_globals):
|
|
|
5499
5927
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5500
5928
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5501
5929
|
)
|
|
5502
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5930
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5503
5931
|
if g_param[OptionsDefine.Language]:
|
|
5504
5932
|
profile.language = g_param[OptionsDefine.Language]
|
|
5505
5933
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5539,7 +5967,10 @@ def doDescribeTLogIpList(args, parsed_globals):
|
|
|
5539
5967
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5540
5968
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5541
5969
|
)
|
|
5542
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5970
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5971
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5972
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5543
5974
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5544
5975
|
else:
|
|
5545
5976
|
cred = credential.Credential(
|
|
@@ -5551,7 +5982,7 @@ def doDescribeTLogIpList(args, parsed_globals):
|
|
|
5551
5982
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5552
5983
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5553
5984
|
)
|
|
5554
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5985
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5555
5986
|
if g_param[OptionsDefine.Language]:
|
|
5556
5987
|
profile.language = g_param[OptionsDefine.Language]
|
|
5557
5988
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5591,7 +6022,10 @@ def doCreateAddressTemplate(args, parsed_globals):
|
|
|
5591
6022
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5592
6023
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5593
6024
|
)
|
|
5594
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6025
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6026
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6027
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6028
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5595
6029
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5596
6030
|
else:
|
|
5597
6031
|
cred = credential.Credential(
|
|
@@ -5603,7 +6037,7 @@ def doCreateAddressTemplate(args, parsed_globals):
|
|
|
5603
6037
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5604
6038
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5605
6039
|
)
|
|
5606
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6040
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5607
6041
|
if g_param[OptionsDefine.Language]:
|
|
5608
6042
|
profile.language = g_param[OptionsDefine.Language]
|
|
5609
6043
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5643,7 +6077,10 @@ def doAddNatAcRule(args, parsed_globals):
|
|
|
5643
6077
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5644
6078
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5645
6079
|
)
|
|
5646
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6080
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6081
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6082
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6083
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5647
6084
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5648
6085
|
else:
|
|
5649
6086
|
cred = credential.Credential(
|
|
@@ -5655,7 +6092,7 @@ def doAddNatAcRule(args, parsed_globals):
|
|
|
5655
6092
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5656
6093
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5657
6094
|
)
|
|
5658
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6095
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5659
6096
|
if g_param[OptionsDefine.Language]:
|
|
5660
6097
|
profile.language = g_param[OptionsDefine.Language]
|
|
5661
6098
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5695,7 +6132,10 @@ def doDescribeBlockStaticList(args, parsed_globals):
|
|
|
5695
6132
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5696
6133
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5697
6134
|
)
|
|
5698
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6135
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6136
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6137
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6138
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5699
6139
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5700
6140
|
else:
|
|
5701
6141
|
cred = credential.Credential(
|
|
@@ -5707,7 +6147,7 @@ def doDescribeBlockStaticList(args, parsed_globals):
|
|
|
5707
6147
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5708
6148
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5709
6149
|
)
|
|
5710
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6150
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5711
6151
|
if g_param[OptionsDefine.Language]:
|
|
5712
6152
|
profile.language = g_param[OptionsDefine.Language]
|
|
5713
6153
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5747,7 +6187,10 @@ def doDescribeFwEdgeIps(args, parsed_globals):
|
|
|
5747
6187
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5748
6188
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5749
6189
|
)
|
|
5750
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6190
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6191
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6192
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6193
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5751
6194
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5752
6195
|
else:
|
|
5753
6196
|
cred = credential.Credential(
|
|
@@ -5759,7 +6202,7 @@ def doDescribeFwEdgeIps(args, parsed_globals):
|
|
|
5759
6202
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5760
6203
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5761
6204
|
)
|
|
5762
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6205
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5763
6206
|
if g_param[OptionsDefine.Language]:
|
|
5764
6207
|
profile.language = g_param[OptionsDefine.Language]
|
|
5765
6208
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5789,58 +6232,6 @@ def doDescribeFwEdgeIps(args, parsed_globals):
|
|
|
5789
6232
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5790
6233
|
|
|
5791
6234
|
|
|
5792
|
-
def doDescribeAcLists(args, parsed_globals):
|
|
5793
|
-
g_param = parse_global_arg(parsed_globals)
|
|
5794
|
-
|
|
5795
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5796
|
-
cred = credential.CVMRoleCredential()
|
|
5797
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5798
|
-
cred = credential.STSAssumeRoleCredential(
|
|
5799
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5800
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5801
|
-
)
|
|
5802
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5803
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5804
|
-
else:
|
|
5805
|
-
cred = credential.Credential(
|
|
5806
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5807
|
-
)
|
|
5808
|
-
http_profile = HttpProfile(
|
|
5809
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5810
|
-
reqMethod="POST",
|
|
5811
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5812
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5813
|
-
)
|
|
5814
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
5815
|
-
if g_param[OptionsDefine.Language]:
|
|
5816
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
5817
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5818
|
-
client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5819
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
5820
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5821
|
-
model = models.DescribeAcListsRequest()
|
|
5822
|
-
model.from_json_string(json.dumps(args))
|
|
5823
|
-
start_time = time.time()
|
|
5824
|
-
while True:
|
|
5825
|
-
rsp = client.DescribeAcLists(model)
|
|
5826
|
-
result = rsp.to_json_string()
|
|
5827
|
-
try:
|
|
5828
|
-
json_obj = json.loads(result)
|
|
5829
|
-
except TypeError as e:
|
|
5830
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5831
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5832
|
-
break
|
|
5833
|
-
cur_time = time.time()
|
|
5834
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5835
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5836
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5837
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5838
|
-
else:
|
|
5839
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5840
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5841
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5842
|
-
|
|
5843
|
-
|
|
5844
6235
|
CLIENT_MAP = {
|
|
5845
6236
|
"v20190904": cfw_client_v20190904,
|
|
5846
6237
|
|
|
@@ -5873,6 +6264,7 @@ ACTION_MAP = {
|
|
|
5873
6264
|
"ModifyBlockTop": doModifyBlockTop,
|
|
5874
6265
|
"DeleteRemoteAccessDomain": doDeleteRemoteAccessDomain,
|
|
5875
6266
|
"RemoveAclRule": doRemoveAclRule,
|
|
6267
|
+
"DeleteNatFwInstance": doDeleteNatFwInstance,
|
|
5876
6268
|
"CreateBlockIgnoreRuleList": doCreateBlockIgnoreRuleList,
|
|
5877
6269
|
"ModifyBlockIgnoreRuleNew": doModifyBlockIgnoreRuleNew,
|
|
5878
6270
|
"ModifyEdgeIpSwitch": doModifyEdgeIpSwitch,
|
|
@@ -5888,7 +6280,7 @@ ACTION_MAP = {
|
|
|
5888
6280
|
"DeleteAllAccessControlRule": doDeleteAllAccessControlRule,
|
|
5889
6281
|
"DescribeSecurityGroupList": doDescribeSecurityGroupList,
|
|
5890
6282
|
"ModifyVpcAcRule": doModifyVpcAcRule,
|
|
5891
|
-
"
|
|
6283
|
+
"DescribeAssetSync": doDescribeAssetSync,
|
|
5892
6284
|
"CreateSecurityGroupRules": doCreateSecurityGroupRules,
|
|
5893
6285
|
"DescribeDefenseSwitch": doDescribeDefenseSwitch,
|
|
5894
6286
|
"DescribeFwGroupInstanceInfo": doDescribeFwGroupInstanceInfo,
|
|
@@ -5898,9 +6290,10 @@ ACTION_MAP = {
|
|
|
5898
6290
|
"CreateBlockIgnoreRuleNew": doCreateBlockIgnoreRuleNew,
|
|
5899
6291
|
"DescribeSourceAsset": doDescribeSourceAsset,
|
|
5900
6292
|
"DeleteResourceGroup": doDeleteResourceGroup,
|
|
5901
|
-
"
|
|
6293
|
+
"DescribeNatFwSwitch": doDescribeNatFwSwitch,
|
|
5902
6294
|
"ModifyVpcFwSequenceRules": doModifyVpcFwSequenceRules,
|
|
5903
6295
|
"CreateAlertCenterOmit": doCreateAlertCenterOmit,
|
|
6296
|
+
"RemoveAcRule": doRemoveAcRule,
|
|
5904
6297
|
"DescribeVpcAcRule": doDescribeVpcAcRule,
|
|
5905
6298
|
"ModifyEnterpriseSecurityGroupRule": doModifyEnterpriseSecurityGroupRule,
|
|
5906
6299
|
"AddAclRule": doAddAclRule,
|
|
@@ -5932,7 +6325,7 @@ ACTION_MAP = {
|
|
|
5932
6325
|
"DescribeCfwEips": doDescribeCfwEips,
|
|
5933
6326
|
"DescribeBlockIgnoreList": doDescribeBlockIgnoreList,
|
|
5934
6327
|
"RemoveNatAcRule": doRemoveNatAcRule,
|
|
5935
|
-
"
|
|
6328
|
+
"DescribeAcLists": doDescribeAcLists,
|
|
5936
6329
|
"DescribeLogStorageStatistic": doDescribeLogStorageStatistic,
|
|
5937
6330
|
"ExpandCfwVertical": doExpandCfwVertical,
|
|
5938
6331
|
"CreateVpcFwGroup": doCreateVpcFwGroup,
|
|
@@ -5963,7 +6356,6 @@ ACTION_MAP = {
|
|
|
5963
6356
|
"AddNatAcRule": doAddNatAcRule,
|
|
5964
6357
|
"DescribeBlockStaticList": doDescribeBlockStaticList,
|
|
5965
6358
|
"DescribeFwEdgeIps": doDescribeFwEdgeIps,
|
|
5966
|
-
"DescribeAcLists": doDescribeAcLists,
|
|
5967
6359
|
|
|
5968
6360
|
}
|
|
5969
6361
|
|