tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -27,7 +27,10 @@ def doRemoveVpcAcRule(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doRemoveVpcAcRule(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doDeleteBlockIgnoreRuleNew(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doDeleteBlockIgnoreRuleNew(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doDescribeVpcFwGroupSwitch(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doDescribeVpcFwGroupSwitch(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doModifyEWRuleStatus(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doModifyEWRuleStatus(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +247,10 @@ def doStopSecurityGroupRuleDispatch(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,7 +262,7 @@ def doStopSecurityGroupRuleDispatch(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +302,10 @@ def doModifyResourceGroup(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doModifyResourceGroup(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doDescribeResourceGroupNew(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doDescribeResourceGroupNew(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -391,7 +412,10 @@ def doModifyVpcFwGroup(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,7 +427,7 @@ def doModifyVpcFwGroup(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +467,10 @@ def doModifyAssetSync(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,7 +482,7 @@ def doModifyAssetSync(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +522,10 @@ def doModifySecurityGroupRule(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,7 +537,7 @@ def doModifySecurityGroupRule(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +577,10 @@ def doAddVpcAcRule(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,7 +592,7 @@ def doAddVpcAcRule(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +632,10 @@ def doAddEnterpriseSecurityGroupRules(args, parsed_globals):
599
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
634
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
640
  else:
605
641
  cred = credential.Credential(
@@ -611,7 +647,7 @@ def doAddEnterpriseSecurityGroupRules(args, parsed_globals):
611
647
  endpoint=g_param[OptionsDefine.Endpoint],
612
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
649
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
651
  if g_param[OptionsDefine.Language]:
616
652
  profile.language = g_param[OptionsDefine.Language]
617
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +687,10 @@ def doDescribeTableStatus(args, parsed_globals):
651
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
689
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
695
  else:
657
696
  cred = credential.Credential(
@@ -663,7 +702,7 @@ def doDescribeTableStatus(args, parsed_globals):
663
702
  endpoint=g_param[OptionsDefine.Endpoint],
664
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
704
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
706
  if g_param[OptionsDefine.Language]:
668
707
  profile.language = g_param[OptionsDefine.Language]
669
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +742,10 @@ def doModifySecurityGroupSequenceRules(args, parsed_globals):
703
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
744
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
750
  else:
709
751
  cred = credential.Credential(
@@ -715,7 +757,7 @@ def doModifySecurityGroupSequenceRules(args, parsed_globals):
715
757
  endpoint=g_param[OptionsDefine.Endpoint],
716
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
759
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
761
  if g_param[OptionsDefine.Language]:
720
762
  profile.language = g_param[OptionsDefine.Language]
721
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +797,10 @@ def doRemoveEnterpriseSecurityGroupRule(args, parsed_globals):
755
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
799
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
805
  else:
761
806
  cred = credential.Credential(
@@ -767,7 +812,7 @@ def doRemoveEnterpriseSecurityGroupRule(args, parsed_globals):
767
812
  endpoint=g_param[OptionsDefine.Endpoint],
768
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
814
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
816
  if g_param[OptionsDefine.Language]:
772
817
  profile.language = g_param[OptionsDefine.Language]
773
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +852,10 @@ def doModifyNatSequenceRules(args, parsed_globals):
807
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
854
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
860
  else:
813
861
  cred = credential.Credential(
@@ -819,7 +867,7 @@ def doModifyNatSequenceRules(args, parsed_globals):
819
867
  endpoint=g_param[OptionsDefine.Endpoint],
820
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
869
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
871
  if g_param[OptionsDefine.Language]:
824
872
  profile.language = g_param[OptionsDefine.Language]
825
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +907,10 @@ def doDescribeUnHandleEventTabList(args, parsed_globals):
859
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
909
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
915
  else:
865
916
  cred = credential.Credential(
@@ -871,7 +922,7 @@ def doDescribeUnHandleEventTabList(args, parsed_globals):
871
922
  endpoint=g_param[OptionsDefine.Endpoint],
872
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
924
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
926
  if g_param[OptionsDefine.Language]:
876
927
  profile.language = g_param[OptionsDefine.Language]
877
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +962,10 @@ def doCreateNatFwInstance(args, parsed_globals):
911
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
964
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
970
  else:
917
971
  cred = credential.Credential(
@@ -923,7 +977,7 @@ def doCreateNatFwInstance(args, parsed_globals):
923
977
  endpoint=g_param[OptionsDefine.Endpoint],
924
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
979
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
981
  if g_param[OptionsDefine.Language]:
928
982
  profile.language = g_param[OptionsDefine.Language]
929
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -963,7 +1017,10 @@ def doModifyBlockTop(args, parsed_globals):
963
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1019
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1025
  else:
969
1026
  cred = credential.Credential(
@@ -975,7 +1032,7 @@ def doModifyBlockTop(args, parsed_globals):
975
1032
  endpoint=g_param[OptionsDefine.Endpoint],
976
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1034
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1036
  if g_param[OptionsDefine.Language]:
980
1037
  profile.language = g_param[OptionsDefine.Language]
981
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1015,7 +1072,10 @@ def doDeleteRemoteAccessDomain(args, parsed_globals):
1015
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1074
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1080
  else:
1021
1081
  cred = credential.Credential(
@@ -1027,7 +1087,7 @@ def doDeleteRemoteAccessDomain(args, parsed_globals):
1027
1087
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1089
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1091
  if g_param[OptionsDefine.Language]:
1032
1092
  profile.language = g_param[OptionsDefine.Language]
1033
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1067,7 +1127,10 @@ def doRemoveAclRule(args, parsed_globals):
1067
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1129
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1135
  else:
1073
1136
  cred = credential.Credential(
@@ -1079,7 +1142,7 @@ def doRemoveAclRule(args, parsed_globals):
1079
1142
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1144
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1146
  if g_param[OptionsDefine.Language]:
1084
1147
  profile.language = g_param[OptionsDefine.Language]
1085
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1109,6 +1172,61 @@ def doRemoveAclRule(args, parsed_globals):
1109
1172
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
1173
 
1111
1174
 
1175
+ def doDeleteNatFwInstance(args, parsed_globals):
1176
+ g_param = parse_global_arg(parsed_globals)
1177
+
1178
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1179
+ cred = credential.CVMRoleCredential()
1180
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1181
+ cred = credential.STSAssumeRoleCredential(
1182
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1183
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1184
+ )
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1189
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1190
+ else:
1191
+ cred = credential.Credential(
1192
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1193
+ )
1194
+ http_profile = HttpProfile(
1195
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1196
+ reqMethod="POST",
1197
+ endpoint=g_param[OptionsDefine.Endpoint],
1198
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1199
+ )
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1201
+ if g_param[OptionsDefine.Language]:
1202
+ profile.language = g_param[OptionsDefine.Language]
1203
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1204
+ client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
1205
+ client._sdkVersion += ("_CLI_" + __version__)
1206
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1207
+ model = models.DeleteNatFwInstanceRequest()
1208
+ model.from_json_string(json.dumps(args))
1209
+ start_time = time.time()
1210
+ while True:
1211
+ rsp = client.DeleteNatFwInstance(model)
1212
+ result = rsp.to_json_string()
1213
+ try:
1214
+ json_obj = json.loads(result)
1215
+ except TypeError as e:
1216
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1217
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1218
+ break
1219
+ cur_time = time.time()
1220
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1221
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1222
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1223
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1224
+ else:
1225
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1226
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1227
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1228
+
1229
+
1112
1230
  def doCreateBlockIgnoreRuleList(args, parsed_globals):
1113
1231
  g_param = parse_global_arg(parsed_globals)
1114
1232
 
@@ -1119,7 +1237,10 @@ def doCreateBlockIgnoreRuleList(args, parsed_globals):
1119
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1239
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1245
  else:
1125
1246
  cred = credential.Credential(
@@ -1131,7 +1252,7 @@ def doCreateBlockIgnoreRuleList(args, parsed_globals):
1131
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1254
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1256
  if g_param[OptionsDefine.Language]:
1136
1257
  profile.language = g_param[OptionsDefine.Language]
1137
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1292,10 @@ def doModifyBlockIgnoreRuleNew(args, parsed_globals):
1171
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1294
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1300
  else:
1177
1301
  cred = credential.Credential(
@@ -1183,7 +1307,7 @@ def doModifyBlockIgnoreRuleNew(args, parsed_globals):
1183
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1309
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1311
  if g_param[OptionsDefine.Language]:
1188
1312
  profile.language = g_param[OptionsDefine.Language]
1189
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1347,10 @@ def doModifyEdgeIpSwitch(args, parsed_globals):
1223
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1349
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1355
  else:
1229
1356
  cred = credential.Credential(
@@ -1235,7 +1362,7 @@ def doModifyEdgeIpSwitch(args, parsed_globals):
1235
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1364
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1366
  if g_param[OptionsDefine.Language]:
1240
1367
  profile.language = g_param[OptionsDefine.Language]
1241
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1275,7 +1402,10 @@ def doDescribeBlockByIpTimesList(args, parsed_globals):
1275
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1404
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1410
  else:
1281
1411
  cred = credential.Credential(
@@ -1287,7 +1417,7 @@ def doDescribeBlockByIpTimesList(args, parsed_globals):
1287
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1419
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1421
  if g_param[OptionsDefine.Language]:
1292
1422
  profile.language = g_param[OptionsDefine.Language]
1293
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1327,7 +1457,10 @@ def doDescribeNatFwDnatRule(args, parsed_globals):
1327
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1459
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1465
  else:
1333
1466
  cred = credential.Credential(
@@ -1339,7 +1472,7 @@ def doDescribeNatFwDnatRule(args, parsed_globals):
1339
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1474
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1476
  if g_param[OptionsDefine.Language]:
1344
1477
  profile.language = g_param[OptionsDefine.Language]
1345
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1379,7 +1512,10 @@ def doDescribeEnterpriseSGRuleProgress(args, parsed_globals):
1379
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1514
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1520
  else:
1385
1521
  cred = credential.Credential(
@@ -1391,7 +1527,7 @@ def doDescribeEnterpriseSGRuleProgress(args, parsed_globals):
1391
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1529
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1531
  if g_param[OptionsDefine.Language]:
1396
1532
  profile.language = g_param[OptionsDefine.Language]
1397
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1431,7 +1567,10 @@ def doDescribeNatFwInfoCount(args, parsed_globals):
1431
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1569
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1575
  else:
1437
1576
  cred = credential.Credential(
@@ -1443,7 +1582,7 @@ def doDescribeNatFwInfoCount(args, parsed_globals):
1443
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1584
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1586
  if g_param[OptionsDefine.Language]:
1448
1587
  profile.language = g_param[OptionsDefine.Language]
1449
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1483,7 +1622,10 @@ def doDescribeNatFwVpcDnsLst(args, parsed_globals):
1483
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1624
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1630
  else:
1489
1631
  cred = credential.Credential(
@@ -1495,7 +1637,7 @@ def doDescribeNatFwVpcDnsLst(args, parsed_globals):
1495
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1639
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1641
  if g_param[OptionsDefine.Language]:
1500
1642
  profile.language = g_param[OptionsDefine.Language]
1501
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1535,7 +1677,10 @@ def doModifyBlockIgnoreRule(args, parsed_globals):
1535
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1679
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1685
  else:
1541
1686
  cred = credential.Credential(
@@ -1547,7 +1692,7 @@ def doModifyBlockIgnoreRule(args, parsed_globals):
1547
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1694
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1696
  if g_param[OptionsDefine.Language]:
1552
1697
  profile.language = g_param[OptionsDefine.Language]
1553
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1587,7 +1732,10 @@ def doDescribeAclRule(args, parsed_globals):
1587
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1734
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1740
  else:
1593
1741
  cred = credential.Credential(
@@ -1599,7 +1747,7 @@ def doDescribeAclRule(args, parsed_globals):
1599
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1749
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1751
  if g_param[OptionsDefine.Language]:
1604
1752
  profile.language = g_param[OptionsDefine.Language]
1605
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +1787,10 @@ def doDescribeNatFwInstance(args, parsed_globals):
1639
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1789
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1795
  else:
1645
1796
  cred = credential.Credential(
@@ -1651,7 +1802,7 @@ def doDescribeNatFwInstance(args, parsed_globals):
1651
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1804
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1806
  if g_param[OptionsDefine.Language]:
1656
1807
  profile.language = g_param[OptionsDefine.Language]
1657
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +1842,10 @@ def doDeleteVpcFwGroup(args, parsed_globals):
1691
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1844
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1850
  else:
1697
1851
  cred = credential.Credential(
@@ -1703,7 +1857,7 @@ def doDeleteVpcFwGroup(args, parsed_globals):
1703
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1704
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
1859
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
1861
  if g_param[OptionsDefine.Language]:
1708
1862
  profile.language = g_param[OptionsDefine.Language]
1709
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +1897,10 @@ def doDeleteAllAccessControlRule(args, parsed_globals):
1743
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
1899
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
1905
  else:
1749
1906
  cred = credential.Credential(
@@ -1755,7 +1912,7 @@ def doDeleteAllAccessControlRule(args, parsed_globals):
1755
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1756
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
1914
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
1916
  if g_param[OptionsDefine.Language]:
1760
1917
  profile.language = g_param[OptionsDefine.Language]
1761
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1795,7 +1952,10 @@ def doDescribeSecurityGroupList(args, parsed_globals):
1795
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
1954
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
1960
  else:
1801
1961
  cred = credential.Credential(
@@ -1807,7 +1967,7 @@ def doDescribeSecurityGroupList(args, parsed_globals):
1807
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1808
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
1969
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
1971
  if g_param[OptionsDefine.Language]:
1812
1972
  profile.language = g_param[OptionsDefine.Language]
1813
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1847,7 +2007,10 @@ def doModifyVpcAcRule(args, parsed_globals):
1847
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2009
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2015
  else:
1853
2016
  cred = credential.Credential(
@@ -1859,7 +2022,7 @@ def doModifyVpcAcRule(args, parsed_globals):
1859
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2024
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2026
  if g_param[OptionsDefine.Language]:
1864
2027
  profile.language = g_param[OptionsDefine.Language]
1865
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1889,7 +2052,7 @@ def doModifyVpcAcRule(args, parsed_globals):
1889
2052
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
2053
 
1891
2054
 
1892
- def doDeleteNatFwInstance(args, parsed_globals):
2055
+ def doDescribeAssetSync(args, parsed_globals):
1893
2056
  g_param = parse_global_arg(parsed_globals)
1894
2057
 
1895
2058
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1899,7 +2062,10 @@ def doDeleteNatFwInstance(args, parsed_globals):
1899
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2064
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2070
  else:
1905
2071
  cred = credential.Credential(
@@ -1911,18 +2077,18 @@ def doDeleteNatFwInstance(args, parsed_globals):
1911
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2079
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2081
  if g_param[OptionsDefine.Language]:
1916
2082
  profile.language = g_param[OptionsDefine.Language]
1917
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1918
2084
  client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
1919
2085
  client._sdkVersion += ("_CLI_" + __version__)
1920
2086
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1921
- model = models.DeleteNatFwInstanceRequest()
2087
+ model = models.DescribeAssetSyncRequest()
1922
2088
  model.from_json_string(json.dumps(args))
1923
2089
  start_time = time.time()
1924
2090
  while True:
1925
- rsp = client.DeleteNatFwInstance(model)
2091
+ rsp = client.DescribeAssetSync(model)
1926
2092
  result = rsp.to_json_string()
1927
2093
  try:
1928
2094
  json_obj = json.loads(result)
@@ -1951,7 +2117,10 @@ def doCreateSecurityGroupRules(args, parsed_globals):
1951
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2119
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2125
  else:
1957
2126
  cred = credential.Credential(
@@ -1963,7 +2132,7 @@ def doCreateSecurityGroupRules(args, parsed_globals):
1963
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2134
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2136
  if g_param[OptionsDefine.Language]:
1968
2137
  profile.language = g_param[OptionsDefine.Language]
1969
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2003,7 +2172,10 @@ def doDescribeDefenseSwitch(args, parsed_globals):
2003
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2174
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2180
  else:
2009
2181
  cred = credential.Credential(
@@ -2015,7 +2187,7 @@ def doDescribeDefenseSwitch(args, parsed_globals):
2015
2187
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2189
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2191
  if g_param[OptionsDefine.Language]:
2020
2192
  profile.language = g_param[OptionsDefine.Language]
2021
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2055,7 +2227,10 @@ def doDescribeFwGroupInstanceInfo(args, parsed_globals):
2055
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2229
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2235
  else:
2061
2236
  cred = credential.Credential(
@@ -2067,7 +2242,7 @@ def doDescribeFwGroupInstanceInfo(args, parsed_globals):
2067
2242
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2244
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2246
  if g_param[OptionsDefine.Language]:
2072
2247
  profile.language = g_param[OptionsDefine.Language]
2073
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2107,7 +2282,10 @@ def doModifyNatFwVpcDnsSwitch(args, parsed_globals):
2107
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2284
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2290
  else:
2113
2291
  cred = credential.Credential(
@@ -2119,7 +2297,7 @@ def doModifyNatFwVpcDnsSwitch(args, parsed_globals):
2119
2297
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2299
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2301
  if g_param[OptionsDefine.Language]:
2124
2302
  profile.language = g_param[OptionsDefine.Language]
2125
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2159,7 +2337,10 @@ def doModifySecurityGroupItemRuleStatus(args, parsed_globals):
2159
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2339
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2345
  else:
2165
2346
  cred = credential.Credential(
@@ -2171,7 +2352,7 @@ def doModifySecurityGroupItemRuleStatus(args, parsed_globals):
2171
2352
  endpoint=g_param[OptionsDefine.Endpoint],
2172
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
2354
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
2356
  if g_param[OptionsDefine.Language]:
2176
2357
  profile.language = g_param[OptionsDefine.Language]
2177
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2211,7 +2392,10 @@ def doDescribeNatFwInstanceWithRegion(args, parsed_globals):
2211
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2394
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2400
  else:
2217
2401
  cred = credential.Credential(
@@ -2223,7 +2407,7 @@ def doDescribeNatFwInstanceWithRegion(args, parsed_globals):
2223
2407
  endpoint=g_param[OptionsDefine.Endpoint],
2224
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
2409
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
2411
  if g_param[OptionsDefine.Language]:
2228
2412
  profile.language = g_param[OptionsDefine.Language]
2229
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2263,7 +2447,10 @@ def doCreateBlockIgnoreRuleNew(args, parsed_globals):
2263
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
2449
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
2455
  else:
2269
2456
  cred = credential.Credential(
@@ -2275,7 +2462,7 @@ def doCreateBlockIgnoreRuleNew(args, parsed_globals):
2275
2462
  endpoint=g_param[OptionsDefine.Endpoint],
2276
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
2464
  )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2279
2466
  if g_param[OptionsDefine.Language]:
2280
2467
  profile.language = g_param[OptionsDefine.Language]
2281
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2315,7 +2502,10 @@ def doDescribeSourceAsset(args, parsed_globals):
2315
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
2504
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
2510
  else:
2321
2511
  cred = credential.Credential(
@@ -2327,7 +2517,7 @@ def doDescribeSourceAsset(args, parsed_globals):
2327
2517
  endpoint=g_param[OptionsDefine.Endpoint],
2328
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
2519
  )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2331
2521
  if g_param[OptionsDefine.Language]:
2332
2522
  profile.language = g_param[OptionsDefine.Language]
2333
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2367,7 +2557,10 @@ def doDeleteResourceGroup(args, parsed_globals):
2367
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
2559
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
2565
  else:
2373
2566
  cred = credential.Credential(
@@ -2379,7 +2572,7 @@ def doDeleteResourceGroup(args, parsed_globals):
2379
2572
  endpoint=g_param[OptionsDefine.Endpoint],
2380
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
2574
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
2576
  if g_param[OptionsDefine.Language]:
2384
2577
  profile.language = g_param[OptionsDefine.Language]
2385
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2409,7 +2602,7 @@ def doDeleteResourceGroup(args, parsed_globals):
2409
2602
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
2603
 
2411
2604
 
2412
- def doRemoveAcRule(args, parsed_globals):
2605
+ def doDescribeNatFwSwitch(args, parsed_globals):
2413
2606
  g_param = parse_global_arg(parsed_globals)
2414
2607
 
2415
2608
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2419,7 +2612,10 @@ def doRemoveAcRule(args, parsed_globals):
2419
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
2614
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
2620
  else:
2425
2621
  cred = credential.Credential(
@@ -2431,18 +2627,18 @@ def doRemoveAcRule(args, parsed_globals):
2431
2627
  endpoint=g_param[OptionsDefine.Endpoint],
2432
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
2629
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
2631
  if g_param[OptionsDefine.Language]:
2436
2632
  profile.language = g_param[OptionsDefine.Language]
2437
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2438
2634
  client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
2439
2635
  client._sdkVersion += ("_CLI_" + __version__)
2440
2636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2441
- model = models.RemoveAcRuleRequest()
2637
+ model = models.DescribeNatFwSwitchRequest()
2442
2638
  model.from_json_string(json.dumps(args))
2443
2639
  start_time = time.time()
2444
2640
  while True:
2445
- rsp = client.RemoveAcRule(model)
2641
+ rsp = client.DescribeNatFwSwitch(model)
2446
2642
  result = rsp.to_json_string()
2447
2643
  try:
2448
2644
  json_obj = json.loads(result)
@@ -2471,7 +2667,10 @@ def doModifyVpcFwSequenceRules(args, parsed_globals):
2471
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
2669
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
2675
  else:
2477
2676
  cred = credential.Credential(
@@ -2483,7 +2682,7 @@ def doModifyVpcFwSequenceRules(args, parsed_globals):
2483
2682
  endpoint=g_param[OptionsDefine.Endpoint],
2484
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
2684
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
2686
  if g_param[OptionsDefine.Language]:
2488
2687
  profile.language = g_param[OptionsDefine.Language]
2489
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2523,7 +2722,10 @@ def doCreateAlertCenterOmit(args, parsed_globals):
2523
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
2724
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
2730
  else:
2529
2731
  cred = credential.Credential(
@@ -2535,7 +2737,7 @@ def doCreateAlertCenterOmit(args, parsed_globals):
2535
2737
  endpoint=g_param[OptionsDefine.Endpoint],
2536
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
2739
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
2741
  if g_param[OptionsDefine.Language]:
2540
2742
  profile.language = g_param[OptionsDefine.Language]
2541
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2565,6 +2767,61 @@ def doCreateAlertCenterOmit(args, parsed_globals):
2565
2767
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2566
2768
 
2567
2769
 
2770
+ def doRemoveAcRule(args, parsed_globals):
2771
+ g_param = parse_global_arg(parsed_globals)
2772
+
2773
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2774
+ cred = credential.CVMRoleCredential()
2775
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2776
+ cred = credential.STSAssumeRoleCredential(
2777
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2778
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2779
+ )
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2784
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2785
+ else:
2786
+ cred = credential.Credential(
2787
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2788
+ )
2789
+ http_profile = HttpProfile(
2790
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2791
+ reqMethod="POST",
2792
+ endpoint=g_param[OptionsDefine.Endpoint],
2793
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2794
+ )
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2796
+ if g_param[OptionsDefine.Language]:
2797
+ profile.language = g_param[OptionsDefine.Language]
2798
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2799
+ client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
2800
+ client._sdkVersion += ("_CLI_" + __version__)
2801
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2802
+ model = models.RemoveAcRuleRequest()
2803
+ model.from_json_string(json.dumps(args))
2804
+ start_time = time.time()
2805
+ while True:
2806
+ rsp = client.RemoveAcRule(model)
2807
+ result = rsp.to_json_string()
2808
+ try:
2809
+ json_obj = json.loads(result)
2810
+ except TypeError as e:
2811
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2812
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2813
+ break
2814
+ cur_time = time.time()
2815
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2816
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2817
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2818
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2819
+ else:
2820
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2821
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2822
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2823
+
2824
+
2568
2825
  def doDescribeVpcAcRule(args, parsed_globals):
2569
2826
  g_param = parse_global_arg(parsed_globals)
2570
2827
 
@@ -2575,7 +2832,10 @@ def doDescribeVpcAcRule(args, parsed_globals):
2575
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
2834
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
2840
  else:
2581
2841
  cred = credential.Credential(
@@ -2587,7 +2847,7 @@ def doDescribeVpcAcRule(args, parsed_globals):
2587
2847
  endpoint=g_param[OptionsDefine.Endpoint],
2588
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
2849
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
2851
  if g_param[OptionsDefine.Language]:
2592
2852
  profile.language = g_param[OptionsDefine.Language]
2593
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2627,7 +2887,10 @@ def doModifyEnterpriseSecurityGroupRule(args, parsed_globals):
2627
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
2889
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
2895
  else:
2633
2896
  cred = credential.Credential(
@@ -2639,7 +2902,7 @@ def doModifyEnterpriseSecurityGroupRule(args, parsed_globals):
2639
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2640
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
2904
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
2906
  if g_param[OptionsDefine.Language]:
2644
2907
  profile.language = g_param[OptionsDefine.Language]
2645
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2679,7 +2942,10 @@ def doAddAclRule(args, parsed_globals):
2679
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
2944
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
2950
  else:
2685
2951
  cred = credential.Credential(
@@ -2691,7 +2957,7 @@ def doAddAclRule(args, parsed_globals):
2691
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2692
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
2959
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
2961
  if g_param[OptionsDefine.Language]:
2696
2962
  profile.language = g_param[OptionsDefine.Language]
2697
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2731,7 +2997,10 @@ def doModifyNatAcRule(args, parsed_globals):
2731
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
2999
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
3005
  else:
2737
3006
  cred = credential.Credential(
@@ -2743,7 +3012,7 @@ def doModifyNatAcRule(args, parsed_globals):
2743
3012
  endpoint=g_param[OptionsDefine.Endpoint],
2744
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
3014
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
3016
  if g_param[OptionsDefine.Language]:
2748
3017
  profile.language = g_param[OptionsDefine.Language]
2749
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2783,7 +3052,10 @@ def doDeleteSecurityGroupRule(args, parsed_globals):
2783
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
3054
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
3060
  else:
2789
3061
  cred = credential.Credential(
@@ -2795,7 +3067,7 @@ def doDeleteSecurityGroupRule(args, parsed_globals):
2795
3067
  endpoint=g_param[OptionsDefine.Endpoint],
2796
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
3069
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
3071
  if g_param[OptionsDefine.Language]:
2800
3072
  profile.language = g_param[OptionsDefine.Language]
2801
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2835,7 +3107,10 @@ def doModifyAddressTemplate(args, parsed_globals):
2835
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2836
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2837
3109
  )
2838
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
3115
  else:
2841
3116
  cred = credential.Credential(
@@ -2847,7 +3122,7 @@ def doModifyAddressTemplate(args, parsed_globals):
2847
3122
  endpoint=g_param[OptionsDefine.Endpoint],
2848
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2849
3124
  )
2850
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2851
3126
  if g_param[OptionsDefine.Language]:
2852
3127
  profile.language = g_param[OptionsDefine.Language]
2853
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2887,7 +3162,10 @@ def doDescribeSwitchLists(args, parsed_globals):
2887
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2888
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2889
3164
  )
2890
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2891
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2892
3170
  else:
2893
3171
  cred = credential.Credential(
@@ -2899,7 +3177,7 @@ def doDescribeSwitchLists(args, parsed_globals):
2899
3177
  endpoint=g_param[OptionsDefine.Endpoint],
2900
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2901
3179
  )
2902
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2903
3181
  if g_param[OptionsDefine.Language]:
2904
3182
  profile.language = g_param[OptionsDefine.Language]
2905
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2939,7 +3217,10 @@ def doModifyTableStatus(args, parsed_globals):
2939
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2940
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2941
3219
  )
2942
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2943
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2944
3225
  else:
2945
3226
  cred = credential.Credential(
@@ -2951,7 +3232,7 @@ def doModifyTableStatus(args, parsed_globals):
2951
3232
  endpoint=g_param[OptionsDefine.Endpoint],
2952
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2953
3234
  )
2954
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2955
3236
  if g_param[OptionsDefine.Language]:
2956
3237
  profile.language = g_param[OptionsDefine.Language]
2957
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2991,7 +3272,10 @@ def doCreateAlertCenterIsolate(args, parsed_globals):
2991
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2992
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2993
3274
  )
2994
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2995
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2996
3280
  else:
2997
3281
  cred = credential.Credential(
@@ -3003,7 +3287,7 @@ def doCreateAlertCenterIsolate(args, parsed_globals):
3003
3287
  endpoint=g_param[OptionsDefine.Endpoint],
3004
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3005
3289
  )
3006
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3007
3291
  if g_param[OptionsDefine.Language]:
3008
3292
  profile.language = g_param[OptionsDefine.Language]
3009
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3043,7 +3327,10 @@ def doModifyBlockIgnoreList(args, parsed_globals):
3043
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3044
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3045
3329
  )
3046
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3047
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3048
3335
  else:
3049
3336
  cred = credential.Credential(
@@ -3055,7 +3342,7 @@ def doModifyBlockIgnoreList(args, parsed_globals):
3055
3342
  endpoint=g_param[OptionsDefine.Endpoint],
3056
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3057
3344
  )
3058
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3059
3346
  if g_param[OptionsDefine.Language]:
3060
3347
  profile.language = g_param[OptionsDefine.Language]
3061
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3095,7 +3382,10 @@ def doCreateChooseVpcs(args, parsed_globals):
3095
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
3384
  )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
3390
  else:
3101
3391
  cred = credential.Credential(
@@ -3107,7 +3397,7 @@ def doCreateChooseVpcs(args, parsed_globals):
3107
3397
  endpoint=g_param[OptionsDefine.Endpoint],
3108
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3109
3399
  )
3110
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3111
3401
  if g_param[OptionsDefine.Language]:
3112
3402
  profile.language = g_param[OptionsDefine.Language]
3113
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3147,7 +3437,10 @@ def doModifyAssetScan(args, parsed_globals):
3147
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3148
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3149
3439
  )
3150
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3151
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3152
3445
  else:
3153
3446
  cred = credential.Credential(
@@ -3159,7 +3452,7 @@ def doModifyAssetScan(args, parsed_globals):
3159
3452
  endpoint=g_param[OptionsDefine.Endpoint],
3160
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3161
3454
  )
3162
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3163
3456
  if g_param[OptionsDefine.Language]:
3164
3457
  profile.language = g_param[OptionsDefine.Language]
3165
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3199,7 +3492,10 @@ def doDeleteAddressTemplate(args, parsed_globals):
3199
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3200
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3201
3494
  )
3202
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3203
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3204
3500
  else:
3205
3501
  cred = credential.Credential(
@@ -3211,7 +3507,7 @@ def doDeleteAddressTemplate(args, parsed_globals):
3211
3507
  endpoint=g_param[OptionsDefine.Endpoint],
3212
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3213
3509
  )
3214
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3215
3511
  if g_param[OptionsDefine.Language]:
3216
3512
  profile.language = g_param[OptionsDefine.Language]
3217
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3251,7 +3547,10 @@ def doModifySequenceRules(args, parsed_globals):
3251
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
3549
  )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
3555
  else:
3257
3556
  cred = credential.Credential(
@@ -3263,7 +3562,7 @@ def doModifySequenceRules(args, parsed_globals):
3263
3562
  endpoint=g_param[OptionsDefine.Endpoint],
3264
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3265
3564
  )
3266
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3267
3566
  if g_param[OptionsDefine.Language]:
3268
3567
  profile.language = g_param[OptionsDefine.Language]
3269
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3303,7 +3602,10 @@ def doModifySequenceAclRules(args, parsed_globals):
3303
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3304
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3305
3604
  )
3306
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3307
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3308
3610
  else:
3309
3611
  cred = credential.Credential(
@@ -3315,7 +3617,7 @@ def doModifySequenceAclRules(args, parsed_globals):
3315
3617
  endpoint=g_param[OptionsDefine.Endpoint],
3316
3618
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3317
3619
  )
3318
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3620
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3319
3621
  if g_param[OptionsDefine.Language]:
3320
3622
  profile.language = g_param[OptionsDefine.Language]
3321
3623
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3355,7 +3657,10 @@ def doDescribeRuleOverview(args, parsed_globals):
3355
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3356
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3357
3659
  )
3358
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3359
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3360
3665
  else:
3361
3666
  cred = credential.Credential(
@@ -3367,7 +3672,7 @@ def doDescribeRuleOverview(args, parsed_globals):
3367
3672
  endpoint=g_param[OptionsDefine.Endpoint],
3368
3673
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3369
3674
  )
3370
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3675
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3371
3676
  if g_param[OptionsDefine.Language]:
3372
3677
  profile.language = g_param[OptionsDefine.Language]
3373
3678
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3407,7 +3712,10 @@ def doDescribeIPStatusList(args, parsed_globals):
3407
3712
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3408
3713
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3409
3714
  )
3410
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3715
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3716
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3717
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3411
3719
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3412
3720
  else:
3413
3721
  cred = credential.Credential(
@@ -3419,7 +3727,7 @@ def doDescribeIPStatusList(args, parsed_globals):
3419
3727
  endpoint=g_param[OptionsDefine.Endpoint],
3420
3728
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3421
3729
  )
3422
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3730
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3423
3731
  if g_param[OptionsDefine.Language]:
3424
3732
  profile.language = g_param[OptionsDefine.Language]
3425
3733
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3459,7 +3767,10 @@ def doDescribeCfwInsStatus(args, parsed_globals):
3459
3767
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3460
3768
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3461
3769
  )
3462
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3770
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3771
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3772
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3463
3774
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3464
3775
  else:
3465
3776
  cred = credential.Credential(
@@ -3471,7 +3782,7 @@ def doDescribeCfwInsStatus(args, parsed_globals):
3471
3782
  endpoint=g_param[OptionsDefine.Endpoint],
3472
3783
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3473
3784
  )
3474
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3785
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3475
3786
  if g_param[OptionsDefine.Language]:
3476
3787
  profile.language = g_param[OptionsDefine.Language]
3477
3788
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3511,7 +3822,10 @@ def doDescribeEnterpriseSecurityGroupRule(args, parsed_globals):
3511
3822
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3512
3823
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3513
3824
  )
3514
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3825
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3826
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3827
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3515
3829
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3516
3830
  else:
3517
3831
  cred = credential.Credential(
@@ -3523,7 +3837,7 @@ def doDescribeEnterpriseSecurityGroupRule(args, parsed_globals):
3523
3837
  endpoint=g_param[OptionsDefine.Endpoint],
3524
3838
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3525
3839
  )
3526
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3840
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3527
3841
  if g_param[OptionsDefine.Language]:
3528
3842
  profile.language = g_param[OptionsDefine.Language]
3529
3843
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3563,7 +3877,10 @@ def doModifyFwGroupSwitch(args, parsed_globals):
3563
3877
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3564
3878
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3565
3879
  )
3566
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3880
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3881
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3882
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3567
3884
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3568
3885
  else:
3569
3886
  cred = credential.Credential(
@@ -3575,7 +3892,7 @@ def doModifyFwGroupSwitch(args, parsed_globals):
3575
3892
  endpoint=g_param[OptionsDefine.Endpoint],
3576
3893
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3577
3894
  )
3578
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3895
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3579
3896
  if g_param[OptionsDefine.Language]:
3580
3897
  profile.language = g_param[OptionsDefine.Language]
3581
3898
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3615,7 +3932,10 @@ def doDescribeLogs(args, parsed_globals):
3615
3932
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3616
3933
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3617
3934
  )
3618
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3935
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3936
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3937
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3619
3939
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3620
3940
  else:
3621
3941
  cred = credential.Credential(
@@ -3627,7 +3947,7 @@ def doDescribeLogs(args, parsed_globals):
3627
3947
  endpoint=g_param[OptionsDefine.Endpoint],
3628
3948
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3629
3949
  )
3630
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3950
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3631
3951
  if g_param[OptionsDefine.Language]:
3632
3952
  profile.language = g_param[OptionsDefine.Language]
3633
3953
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3667,7 +3987,10 @@ def doSetNatFwDnatRule(args, parsed_globals):
3667
3987
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
3988
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
3989
  )
3670
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3990
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3991
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3992
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
3994
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
3995
  else:
3673
3996
  cred = credential.Credential(
@@ -3679,7 +4002,7 @@ def doSetNatFwDnatRule(args, parsed_globals):
3679
4002
  endpoint=g_param[OptionsDefine.Endpoint],
3680
4003
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3681
4004
  )
3682
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4005
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3683
4006
  if g_param[OptionsDefine.Language]:
3684
4007
  profile.language = g_param[OptionsDefine.Language]
3685
4008
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3719,7 +4042,10 @@ def doModifyAllRuleStatus(args, parsed_globals):
3719
4042
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3720
4043
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3721
4044
  )
3722
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4045
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4046
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4047
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3723
4049
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3724
4050
  else:
3725
4051
  cred = credential.Credential(
@@ -3731,7 +4057,7 @@ def doModifyAllRuleStatus(args, parsed_globals):
3731
4057
  endpoint=g_param[OptionsDefine.Endpoint],
3732
4058
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3733
4059
  )
3734
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4060
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3735
4061
  if g_param[OptionsDefine.Language]:
3736
4062
  profile.language = g_param[OptionsDefine.Language]
3737
4063
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3771,7 +4097,10 @@ def doDeleteBlockIgnoreRuleList(args, parsed_globals):
3771
4097
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3772
4098
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3773
4099
  )
3774
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4100
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4101
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4102
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3775
4104
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3776
4105
  else:
3777
4106
  cred = credential.Credential(
@@ -3783,7 +4112,7 @@ def doDeleteBlockIgnoreRuleList(args, parsed_globals):
3783
4112
  endpoint=g_param[OptionsDefine.Endpoint],
3784
4113
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3785
4114
  )
3786
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4115
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3787
4116
  if g_param[OptionsDefine.Language]:
3788
4117
  profile.language = g_param[OptionsDefine.Language]
3789
4118
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3823,7 +4152,10 @@ def doSetNatFwEip(args, parsed_globals):
3823
4152
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
4153
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
4154
  )
3826
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4155
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4156
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4157
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
4159
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
4160
  else:
3829
4161
  cred = credential.Credential(
@@ -3835,7 +4167,7 @@ def doSetNatFwEip(args, parsed_globals):
3835
4167
  endpoint=g_param[OptionsDefine.Endpoint],
3836
4168
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
4169
  )
3838
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4170
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3839
4171
  if g_param[OptionsDefine.Language]:
3840
4172
  profile.language = g_param[OptionsDefine.Language]
3841
4173
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3875,7 +4207,10 @@ def doCreateAlertCenterRule(args, parsed_globals):
3875
4207
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3876
4208
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3877
4209
  )
3878
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4210
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4211
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4212
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3879
4214
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3880
4215
  else:
3881
4216
  cred = credential.Credential(
@@ -3887,7 +4222,7 @@ def doCreateAlertCenterRule(args, parsed_globals):
3887
4222
  endpoint=g_param[OptionsDefine.Endpoint],
3888
4223
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3889
4224
  )
3890
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4225
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3891
4226
  if g_param[OptionsDefine.Language]:
3892
4227
  profile.language = g_param[OptionsDefine.Language]
3893
4228
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3927,7 +4262,10 @@ def doModifyAclRule(args, parsed_globals):
3927
4262
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3928
4263
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3929
4264
  )
3930
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4265
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4266
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4267
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3931
4269
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3932
4270
  else:
3933
4271
  cred = credential.Credential(
@@ -3939,7 +4277,7 @@ def doModifyAclRule(args, parsed_globals):
3939
4277
  endpoint=g_param[OptionsDefine.Endpoint],
3940
4278
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3941
4279
  )
3942
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4280
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3943
4281
  if g_param[OptionsDefine.Language]:
3944
4282
  profile.language = g_param[OptionsDefine.Language]
3945
4283
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3979,7 +4317,10 @@ def doDescribeEnterpriseSecurityGroupRuleList(args, parsed_globals):
3979
4317
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3980
4318
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3981
4319
  )
3982
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4320
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4321
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4322
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3983
4324
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3984
4325
  else:
3985
4326
  cred = credential.Credential(
@@ -3991,7 +4332,7 @@ def doDescribeEnterpriseSecurityGroupRuleList(args, parsed_globals):
3991
4332
  endpoint=g_param[OptionsDefine.Endpoint],
3992
4333
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3993
4334
  )
3994
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4335
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3995
4336
  if g_param[OptionsDefine.Language]:
3996
4337
  profile.language = g_param[OptionsDefine.Language]
3997
4338
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4031,7 +4372,10 @@ def doDescribeCfwEips(args, parsed_globals):
4031
4372
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4032
4373
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4033
4374
  )
4034
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4375
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4376
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4377
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4035
4379
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4036
4380
  else:
4037
4381
  cred = credential.Credential(
@@ -4043,7 +4387,7 @@ def doDescribeCfwEips(args, parsed_globals):
4043
4387
  endpoint=g_param[OptionsDefine.Endpoint],
4044
4388
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4045
4389
  )
4046
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4390
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4047
4391
  if g_param[OptionsDefine.Language]:
4048
4392
  profile.language = g_param[OptionsDefine.Language]
4049
4393
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4083,7 +4427,10 @@ def doDescribeBlockIgnoreList(args, parsed_globals):
4083
4427
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4084
4428
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4085
4429
  )
4086
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4430
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4431
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4432
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4433
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4087
4434
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4088
4435
  else:
4089
4436
  cred = credential.Credential(
@@ -4095,7 +4442,7 @@ def doDescribeBlockIgnoreList(args, parsed_globals):
4095
4442
  endpoint=g_param[OptionsDefine.Endpoint],
4096
4443
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4097
4444
  )
4098
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4445
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4099
4446
  if g_param[OptionsDefine.Language]:
4100
4447
  profile.language = g_param[OptionsDefine.Language]
4101
4448
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4135,7 +4482,10 @@ def doRemoveNatAcRule(args, parsed_globals):
4135
4482
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4136
4483
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4137
4484
  )
4138
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4485
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4486
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4487
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4488
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4139
4489
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4140
4490
  else:
4141
4491
  cred = credential.Credential(
@@ -4147,7 +4497,7 @@ def doRemoveNatAcRule(args, parsed_globals):
4147
4497
  endpoint=g_param[OptionsDefine.Endpoint],
4148
4498
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4149
4499
  )
4150
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4500
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4151
4501
  if g_param[OptionsDefine.Language]:
4152
4502
  profile.language = g_param[OptionsDefine.Language]
4153
4503
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4177,7 +4527,7 @@ def doRemoveNatAcRule(args, parsed_globals):
4177
4527
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4178
4528
 
4179
4529
 
4180
- def doDescribeAssetSync(args, parsed_globals):
4530
+ def doDescribeAcLists(args, parsed_globals):
4181
4531
  g_param = parse_global_arg(parsed_globals)
4182
4532
 
4183
4533
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4187,7 +4537,10 @@ def doDescribeAssetSync(args, parsed_globals):
4187
4537
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4188
4538
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4189
4539
  )
4190
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4540
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4541
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4542
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4543
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4191
4544
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4192
4545
  else:
4193
4546
  cred = credential.Credential(
@@ -4199,18 +4552,18 @@ def doDescribeAssetSync(args, parsed_globals):
4199
4552
  endpoint=g_param[OptionsDefine.Endpoint],
4200
4553
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4201
4554
  )
4202
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4555
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4203
4556
  if g_param[OptionsDefine.Language]:
4204
4557
  profile.language = g_param[OptionsDefine.Language]
4205
4558
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4206
4559
  client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
4207
4560
  client._sdkVersion += ("_CLI_" + __version__)
4208
4561
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4209
- model = models.DescribeAssetSyncRequest()
4562
+ model = models.DescribeAcListsRequest()
4210
4563
  model.from_json_string(json.dumps(args))
4211
4564
  start_time = time.time()
4212
4565
  while True:
4213
- rsp = client.DescribeAssetSync(model)
4566
+ rsp = client.DescribeAcLists(model)
4214
4567
  result = rsp.to_json_string()
4215
4568
  try:
4216
4569
  json_obj = json.loads(result)
@@ -4239,7 +4592,10 @@ def doDescribeLogStorageStatistic(args, parsed_globals):
4239
4592
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4240
4593
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4241
4594
  )
4242
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4595
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4596
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4597
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4598
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4243
4599
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4244
4600
  else:
4245
4601
  cred = credential.Credential(
@@ -4251,7 +4607,7 @@ def doDescribeLogStorageStatistic(args, parsed_globals):
4251
4607
  endpoint=g_param[OptionsDefine.Endpoint],
4252
4608
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4253
4609
  )
4254
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4610
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4255
4611
  if g_param[OptionsDefine.Language]:
4256
4612
  profile.language = g_param[OptionsDefine.Language]
4257
4613
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4291,7 +4647,10 @@ def doExpandCfwVertical(args, parsed_globals):
4291
4647
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4292
4648
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4293
4649
  )
4294
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4650
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4651
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4652
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4653
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4295
4654
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4296
4655
  else:
4297
4656
  cred = credential.Credential(
@@ -4303,7 +4662,7 @@ def doExpandCfwVertical(args, parsed_globals):
4303
4662
  endpoint=g_param[OptionsDefine.Endpoint],
4304
4663
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4305
4664
  )
4306
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4665
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4307
4666
  if g_param[OptionsDefine.Language]:
4308
4667
  profile.language = g_param[OptionsDefine.Language]
4309
4668
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4343,7 +4702,10 @@ def doCreateVpcFwGroup(args, parsed_globals):
4343
4702
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4344
4703
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4345
4704
  )
4346
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4705
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4706
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4707
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4708
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4347
4709
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4348
4710
  else:
4349
4711
  cred = credential.Credential(
@@ -4355,7 +4717,7 @@ def doCreateVpcFwGroup(args, parsed_globals):
4355
4717
  endpoint=g_param[OptionsDefine.Endpoint],
4356
4718
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4357
4719
  )
4358
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4720
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4359
4721
  if g_param[OptionsDefine.Language]:
4360
4722
  profile.language = g_param[OptionsDefine.Language]
4361
4723
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4395,7 +4757,10 @@ def doModifyAllPublicIPSwitchStatus(args, parsed_globals):
4395
4757
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4396
4758
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4397
4759
  )
4398
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4760
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4761
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4762
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4763
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4399
4764
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4400
4765
  else:
4401
4766
  cred = credential.Credential(
@@ -4407,7 +4772,7 @@ def doModifyAllPublicIPSwitchStatus(args, parsed_globals):
4407
4772
  endpoint=g_param[OptionsDefine.Endpoint],
4408
4773
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4409
4774
  )
4410
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4775
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4411
4776
  if g_param[OptionsDefine.Language]:
4412
4777
  profile.language = g_param[OptionsDefine.Language]
4413
4778
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4447,7 +4812,10 @@ def doDescribeAssociatedInstanceList(args, parsed_globals):
4447
4812
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4448
4813
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4449
4814
  )
4450
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4816
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4817
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4818
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4451
4819
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4452
4820
  else:
4453
4821
  cred = credential.Credential(
@@ -4459,7 +4827,7 @@ def doDescribeAssociatedInstanceList(args, parsed_globals):
4459
4827
  endpoint=g_param[OptionsDefine.Endpoint],
4460
4828
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4461
4829
  )
4462
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4830
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4463
4831
  if g_param[OptionsDefine.Language]:
4464
4832
  profile.language = g_param[OptionsDefine.Language]
4465
4833
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4499,7 +4867,10 @@ def doDeleteAcRule(args, parsed_globals):
4499
4867
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4500
4868
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4501
4869
  )
4502
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4870
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4871
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4872
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4873
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4503
4874
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4504
4875
  else:
4505
4876
  cred = credential.Credential(
@@ -4511,7 +4882,7 @@ def doDeleteAcRule(args, parsed_globals):
4511
4882
  endpoint=g_param[OptionsDefine.Endpoint],
4512
4883
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4513
4884
  )
4514
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4885
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4515
4886
  if g_param[OptionsDefine.Language]:
4516
4887
  profile.language = g_param[OptionsDefine.Language]
4517
4888
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4551,7 +4922,10 @@ def doDescribeNatAcRule(args, parsed_globals):
4551
4922
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4552
4923
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4553
4924
  )
4554
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4925
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4926
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4927
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4928
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4555
4929
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4556
4930
  else:
4557
4931
  cred = credential.Credential(
@@ -4563,7 +4937,7 @@ def doDescribeNatAcRule(args, parsed_globals):
4563
4937
  endpoint=g_param[OptionsDefine.Endpoint],
4564
4938
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4565
4939
  )
4566
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4940
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4567
4941
  if g_param[OptionsDefine.Language]:
4568
4942
  profile.language = g_param[OptionsDefine.Language]
4569
4943
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4603,7 +4977,10 @@ def doModifyNatInstance(args, parsed_globals):
4603
4977
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4604
4978
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4605
4979
  )
4606
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4980
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4981
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4982
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4983
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4607
4984
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4608
4985
  else:
4609
4986
  cred = credential.Credential(
@@ -4615,7 +4992,7 @@ def doModifyNatInstance(args, parsed_globals):
4615
4992
  endpoint=g_param[OptionsDefine.Endpoint],
4616
4993
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4617
4994
  )
4618
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4995
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4619
4996
  if g_param[OptionsDefine.Language]:
4620
4997
  profile.language = g_param[OptionsDefine.Language]
4621
4998
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4655,7 +5032,10 @@ def doDescribeFwSyncStatus(args, parsed_globals):
4655
5032
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4656
5033
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4657
5034
  )
4658
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5035
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5036
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5037
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5038
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4659
5039
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4660
5040
  else:
4661
5041
  cred = credential.Credential(
@@ -4667,7 +5047,7 @@ def doDescribeFwSyncStatus(args, parsed_globals):
4667
5047
  endpoint=g_param[OptionsDefine.Endpoint],
4668
5048
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4669
5049
  )
4670
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5050
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4671
5051
  if g_param[OptionsDefine.Language]:
4672
5052
  profile.language = g_param[OptionsDefine.Language]
4673
5053
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4707,7 +5087,10 @@ def doCreateDatabaseWhiteListRules(args, parsed_globals):
4707
5087
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4708
5088
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4709
5089
  )
4710
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5090
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5091
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5092
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5093
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4711
5094
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4712
5095
  else:
4713
5096
  cred = credential.Credential(
@@ -4719,7 +5102,7 @@ def doCreateDatabaseWhiteListRules(args, parsed_globals):
4719
5102
  endpoint=g_param[OptionsDefine.Endpoint],
4720
5103
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4721
5104
  )
4722
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5105
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4723
5106
  if g_param[OptionsDefine.Language]:
4724
5107
  profile.language = g_param[OptionsDefine.Language]
4725
5108
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4759,7 +5142,10 @@ def doCreateNatFwInstanceWithDomain(args, parsed_globals):
4759
5142
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4760
5143
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4761
5144
  )
4762
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5145
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5146
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5147
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5148
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4763
5149
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4764
5150
  else:
4765
5151
  cred = credential.Credential(
@@ -4771,7 +5157,7 @@ def doCreateNatFwInstanceWithDomain(args, parsed_globals):
4771
5157
  endpoint=g_param[OptionsDefine.Endpoint],
4772
5158
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4773
5159
  )
4774
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5160
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4775
5161
  if g_param[OptionsDefine.Language]:
4776
5162
  profile.language = g_param[OptionsDefine.Language]
4777
5163
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4811,7 +5197,10 @@ def doCreateAcRules(args, parsed_globals):
4811
5197
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4812
5198
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4813
5199
  )
4814
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5200
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5201
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5202
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5203
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
5204
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4816
5205
  else:
4817
5206
  cred = credential.Credential(
@@ -4823,7 +5212,7 @@ def doCreateAcRules(args, parsed_globals):
4823
5212
  endpoint=g_param[OptionsDefine.Endpoint],
4824
5213
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4825
5214
  )
4826
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5215
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4827
5216
  if g_param[OptionsDefine.Language]:
4828
5217
  profile.language = g_param[OptionsDefine.Language]
4829
5218
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4863,7 +5252,10 @@ def doModifyEnterpriseSecurityDispatchStatus(args, parsed_globals):
4863
5252
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4864
5253
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4865
5254
  )
4866
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5255
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5256
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5257
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5258
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4867
5259
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4868
5260
  else:
4869
5261
  cred = credential.Credential(
@@ -4875,7 +5267,7 @@ def doModifyEnterpriseSecurityDispatchStatus(args, parsed_globals):
4875
5267
  endpoint=g_param[OptionsDefine.Endpoint],
4876
5268
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4877
5269
  )
4878
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5270
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4879
5271
  if g_param[OptionsDefine.Language]:
4880
5272
  profile.language = g_param[OptionsDefine.Language]
4881
5273
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4915,7 +5307,10 @@ def doDescribeTLogInfo(args, parsed_globals):
4915
5307
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4916
5308
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4917
5309
  )
4918
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5310
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5311
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5312
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5313
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4919
5314
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4920
5315
  else:
4921
5316
  cred = credential.Credential(
@@ -4927,7 +5322,7 @@ def doDescribeTLogInfo(args, parsed_globals):
4927
5322
  endpoint=g_param[OptionsDefine.Endpoint],
4928
5323
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4929
5324
  )
4930
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5325
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4931
5326
  if g_param[OptionsDefine.Language]:
4932
5327
  profile.language = g_param[OptionsDefine.Language]
4933
5328
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4967,7 +5362,10 @@ def doModifyRunSyncAsset(args, parsed_globals):
4967
5362
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4968
5363
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4969
5364
  )
4970
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5365
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5366
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5367
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5368
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4971
5369
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4972
5370
  else:
4973
5371
  cred = credential.Credential(
@@ -4979,7 +5377,7 @@ def doModifyRunSyncAsset(args, parsed_globals):
4979
5377
  endpoint=g_param[OptionsDefine.Endpoint],
4980
5378
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4981
5379
  )
4982
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5380
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4983
5381
  if g_param[OptionsDefine.Language]:
4984
5382
  profile.language = g_param[OptionsDefine.Language]
4985
5383
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5019,7 +5417,10 @@ def doDescribeGuideScanInfo(args, parsed_globals):
5019
5417
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5020
5418
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5021
5419
  )
5022
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5420
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5421
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5422
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5423
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5023
5424
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5024
5425
  else:
5025
5426
  cred = credential.Credential(
@@ -5031,7 +5432,7 @@ def doDescribeGuideScanInfo(args, parsed_globals):
5031
5432
  endpoint=g_param[OptionsDefine.Endpoint],
5032
5433
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5033
5434
  )
5034
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5435
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5035
5436
  if g_param[OptionsDefine.Language]:
5036
5437
  profile.language = g_param[OptionsDefine.Language]
5037
5438
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5071,7 +5472,10 @@ def doDescribeAddressTemplateList(args, parsed_globals):
5071
5472
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5072
5473
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5073
5474
  )
5074
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5475
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5476
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5477
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5478
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5075
5479
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5076
5480
  else:
5077
5481
  cred = credential.Credential(
@@ -5083,7 +5487,7 @@ def doDescribeAddressTemplateList(args, parsed_globals):
5083
5487
  endpoint=g_param[OptionsDefine.Endpoint],
5084
5488
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5085
5489
  )
5086
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5490
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5087
5491
  if g_param[OptionsDefine.Language]:
5088
5492
  profile.language = g_param[OptionsDefine.Language]
5089
5493
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5123,7 +5527,10 @@ def doDescribeNatFwInstancesInfo(args, parsed_globals):
5123
5527
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5124
5528
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5125
5529
  )
5126
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5530
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5531
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5532
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5533
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5127
5534
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5128
5535
  else:
5129
5536
  cred = credential.Credential(
@@ -5135,7 +5542,7 @@ def doDescribeNatFwInstancesInfo(args, parsed_globals):
5135
5542
  endpoint=g_param[OptionsDefine.Endpoint],
5136
5543
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5137
5544
  )
5138
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5545
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5139
5546
  if g_param[OptionsDefine.Language]:
5140
5547
  profile.language = g_param[OptionsDefine.Language]
5141
5548
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5175,7 +5582,10 @@ def doModifyNatFwReSelect(args, parsed_globals):
5175
5582
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5176
5583
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5177
5584
  )
5178
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5585
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5586
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5587
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5588
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5179
5589
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5180
5590
  else:
5181
5591
  cred = credential.Credential(
@@ -5187,7 +5597,7 @@ def doModifyNatFwReSelect(args, parsed_globals):
5187
5597
  endpoint=g_param[OptionsDefine.Endpoint],
5188
5598
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5189
5599
  )
5190
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5600
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5191
5601
  if g_param[OptionsDefine.Language]:
5192
5602
  profile.language = g_param[OptionsDefine.Language]
5193
5603
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5227,7 +5637,10 @@ def doModifyStorageSetting(args, parsed_globals):
5227
5637
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5228
5638
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5229
5639
  )
5230
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5640
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5641
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5642
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5643
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5231
5644
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5232
5645
  else:
5233
5646
  cred = credential.Credential(
@@ -5239,7 +5652,7 @@ def doModifyStorageSetting(args, parsed_globals):
5239
5652
  endpoint=g_param[OptionsDefine.Endpoint],
5240
5653
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5241
5654
  )
5242
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5655
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5243
5656
  if g_param[OptionsDefine.Language]:
5244
5657
  profile.language = g_param[OptionsDefine.Language]
5245
5658
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5279,7 +5692,10 @@ def doSearchLog(args, parsed_globals):
5279
5692
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5280
5693
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5281
5694
  )
5282
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5695
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5696
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5697
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5698
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5283
5699
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5284
5700
  else:
5285
5701
  cred = credential.Credential(
@@ -5291,7 +5707,7 @@ def doSearchLog(args, parsed_globals):
5291
5707
  endpoint=g_param[OptionsDefine.Endpoint],
5292
5708
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5293
5709
  )
5294
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5710
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5295
5711
  if g_param[OptionsDefine.Language]:
5296
5712
  profile.language = g_param[OptionsDefine.Language]
5297
5713
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5331,7 +5747,10 @@ def doDescribeResourceGroup(args, parsed_globals):
5331
5747
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5332
5748
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5333
5749
  )
5334
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5750
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5751
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5752
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5753
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5335
5754
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5336
5755
  else:
5337
5756
  cred = credential.Credential(
@@ -5343,7 +5762,7 @@ def doDescribeResourceGroup(args, parsed_globals):
5343
5762
  endpoint=g_param[OptionsDefine.Endpoint],
5344
5763
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5345
5764
  )
5346
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5765
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5347
5766
  if g_param[OptionsDefine.Language]:
5348
5767
  profile.language = g_param[OptionsDefine.Language]
5349
5768
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5383,7 +5802,10 @@ def doSyncFwOperate(args, parsed_globals):
5383
5802
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5384
5803
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5385
5804
  )
5386
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5805
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5806
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5807
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5808
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5387
5809
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5388
5810
  else:
5389
5811
  cred = credential.Credential(
@@ -5395,7 +5817,7 @@ def doSyncFwOperate(args, parsed_globals):
5395
5817
  endpoint=g_param[OptionsDefine.Endpoint],
5396
5818
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5397
5819
  )
5398
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5820
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5399
5821
  if g_param[OptionsDefine.Language]:
5400
5822
  profile.language = g_param[OptionsDefine.Language]
5401
5823
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5435,7 +5857,10 @@ def doModifyAcRule(args, parsed_globals):
5435
5857
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5436
5858
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5437
5859
  )
5438
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5860
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5861
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5862
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5863
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5439
5864
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5440
5865
  else:
5441
5866
  cred = credential.Credential(
@@ -5447,7 +5872,7 @@ def doModifyAcRule(args, parsed_globals):
5447
5872
  endpoint=g_param[OptionsDefine.Endpoint],
5448
5873
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5449
5874
  )
5450
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5875
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5451
5876
  if g_param[OptionsDefine.Language]:
5452
5877
  profile.language = g_param[OptionsDefine.Language]
5453
5878
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5487,7 +5912,10 @@ def doModifyNatFwSwitch(args, parsed_globals):
5487
5912
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5488
5913
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5489
5914
  )
5490
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5915
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5916
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5917
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5918
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5491
5919
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5492
5920
  else:
5493
5921
  cred = credential.Credential(
@@ -5499,7 +5927,7 @@ def doModifyNatFwSwitch(args, parsed_globals):
5499
5927
  endpoint=g_param[OptionsDefine.Endpoint],
5500
5928
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5501
5929
  )
5502
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5930
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5503
5931
  if g_param[OptionsDefine.Language]:
5504
5932
  profile.language = g_param[OptionsDefine.Language]
5505
5933
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5539,7 +5967,10 @@ def doDescribeTLogIpList(args, parsed_globals):
5539
5967
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5540
5968
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5541
5969
  )
5542
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5970
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5971
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5972
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5973
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5543
5974
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5544
5975
  else:
5545
5976
  cred = credential.Credential(
@@ -5551,7 +5982,7 @@ def doDescribeTLogIpList(args, parsed_globals):
5551
5982
  endpoint=g_param[OptionsDefine.Endpoint],
5552
5983
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5553
5984
  )
5554
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5985
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5555
5986
  if g_param[OptionsDefine.Language]:
5556
5987
  profile.language = g_param[OptionsDefine.Language]
5557
5988
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5591,7 +6022,10 @@ def doCreateAddressTemplate(args, parsed_globals):
5591
6022
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5592
6023
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5593
6024
  )
5594
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6025
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6026
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6027
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6028
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5595
6029
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5596
6030
  else:
5597
6031
  cred = credential.Credential(
@@ -5603,7 +6037,7 @@ def doCreateAddressTemplate(args, parsed_globals):
5603
6037
  endpoint=g_param[OptionsDefine.Endpoint],
5604
6038
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5605
6039
  )
5606
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6040
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5607
6041
  if g_param[OptionsDefine.Language]:
5608
6042
  profile.language = g_param[OptionsDefine.Language]
5609
6043
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5643,7 +6077,10 @@ def doAddNatAcRule(args, parsed_globals):
5643
6077
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5644
6078
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5645
6079
  )
5646
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6080
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6081
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6082
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6083
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5647
6084
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5648
6085
  else:
5649
6086
  cred = credential.Credential(
@@ -5655,7 +6092,7 @@ def doAddNatAcRule(args, parsed_globals):
5655
6092
  endpoint=g_param[OptionsDefine.Endpoint],
5656
6093
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5657
6094
  )
5658
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6095
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5659
6096
  if g_param[OptionsDefine.Language]:
5660
6097
  profile.language = g_param[OptionsDefine.Language]
5661
6098
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5695,7 +6132,10 @@ def doDescribeBlockStaticList(args, parsed_globals):
5695
6132
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5696
6133
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5697
6134
  )
5698
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6135
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6136
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6137
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6138
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5699
6139
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5700
6140
  else:
5701
6141
  cred = credential.Credential(
@@ -5707,7 +6147,7 @@ def doDescribeBlockStaticList(args, parsed_globals):
5707
6147
  endpoint=g_param[OptionsDefine.Endpoint],
5708
6148
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5709
6149
  )
5710
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6150
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5711
6151
  if g_param[OptionsDefine.Language]:
5712
6152
  profile.language = g_param[OptionsDefine.Language]
5713
6153
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5747,7 +6187,10 @@ def doDescribeFwEdgeIps(args, parsed_globals):
5747
6187
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5748
6188
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5749
6189
  )
5750
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6190
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6191
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6192
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6193
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5751
6194
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5752
6195
  else:
5753
6196
  cred = credential.Credential(
@@ -5759,7 +6202,7 @@ def doDescribeFwEdgeIps(args, parsed_globals):
5759
6202
  endpoint=g_param[OptionsDefine.Endpoint],
5760
6203
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5761
6204
  )
5762
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6205
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5763
6206
  if g_param[OptionsDefine.Language]:
5764
6207
  profile.language = g_param[OptionsDefine.Language]
5765
6208
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5789,58 +6232,6 @@ def doDescribeFwEdgeIps(args, parsed_globals):
5789
6232
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5790
6233
 
5791
6234
 
5792
- def doDescribeAcLists(args, parsed_globals):
5793
- g_param = parse_global_arg(parsed_globals)
5794
-
5795
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5796
- cred = credential.CVMRoleCredential()
5797
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5798
- cred = credential.STSAssumeRoleCredential(
5799
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5800
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5801
- )
5802
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5803
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5804
- else:
5805
- cred = credential.Credential(
5806
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5807
- )
5808
- http_profile = HttpProfile(
5809
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5810
- reqMethod="POST",
5811
- endpoint=g_param[OptionsDefine.Endpoint],
5812
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5813
- )
5814
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5815
- if g_param[OptionsDefine.Language]:
5816
- profile.language = g_param[OptionsDefine.Language]
5817
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5818
- client = mod.CfwClient(cred, g_param[OptionsDefine.Region], profile)
5819
- client._sdkVersion += ("_CLI_" + __version__)
5820
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
5821
- model = models.DescribeAcListsRequest()
5822
- model.from_json_string(json.dumps(args))
5823
- start_time = time.time()
5824
- while True:
5825
- rsp = client.DescribeAcLists(model)
5826
- result = rsp.to_json_string()
5827
- try:
5828
- json_obj = json.loads(result)
5829
- except TypeError as e:
5830
- json_obj = json.loads(result.decode('utf-8')) # python3.3
5831
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5832
- break
5833
- cur_time = time.time()
5834
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5835
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5836
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5837
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5838
- else:
5839
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5840
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5841
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5842
-
5843
-
5844
6235
  CLIENT_MAP = {
5845
6236
  "v20190904": cfw_client_v20190904,
5846
6237
 
@@ -5873,6 +6264,7 @@ ACTION_MAP = {
5873
6264
  "ModifyBlockTop": doModifyBlockTop,
5874
6265
  "DeleteRemoteAccessDomain": doDeleteRemoteAccessDomain,
5875
6266
  "RemoveAclRule": doRemoveAclRule,
6267
+ "DeleteNatFwInstance": doDeleteNatFwInstance,
5876
6268
  "CreateBlockIgnoreRuleList": doCreateBlockIgnoreRuleList,
5877
6269
  "ModifyBlockIgnoreRuleNew": doModifyBlockIgnoreRuleNew,
5878
6270
  "ModifyEdgeIpSwitch": doModifyEdgeIpSwitch,
@@ -5888,7 +6280,7 @@ ACTION_MAP = {
5888
6280
  "DeleteAllAccessControlRule": doDeleteAllAccessControlRule,
5889
6281
  "DescribeSecurityGroupList": doDescribeSecurityGroupList,
5890
6282
  "ModifyVpcAcRule": doModifyVpcAcRule,
5891
- "DeleteNatFwInstance": doDeleteNatFwInstance,
6283
+ "DescribeAssetSync": doDescribeAssetSync,
5892
6284
  "CreateSecurityGroupRules": doCreateSecurityGroupRules,
5893
6285
  "DescribeDefenseSwitch": doDescribeDefenseSwitch,
5894
6286
  "DescribeFwGroupInstanceInfo": doDescribeFwGroupInstanceInfo,
@@ -5898,9 +6290,10 @@ ACTION_MAP = {
5898
6290
  "CreateBlockIgnoreRuleNew": doCreateBlockIgnoreRuleNew,
5899
6291
  "DescribeSourceAsset": doDescribeSourceAsset,
5900
6292
  "DeleteResourceGroup": doDeleteResourceGroup,
5901
- "RemoveAcRule": doRemoveAcRule,
6293
+ "DescribeNatFwSwitch": doDescribeNatFwSwitch,
5902
6294
  "ModifyVpcFwSequenceRules": doModifyVpcFwSequenceRules,
5903
6295
  "CreateAlertCenterOmit": doCreateAlertCenterOmit,
6296
+ "RemoveAcRule": doRemoveAcRule,
5904
6297
  "DescribeVpcAcRule": doDescribeVpcAcRule,
5905
6298
  "ModifyEnterpriseSecurityGroupRule": doModifyEnterpriseSecurityGroupRule,
5906
6299
  "AddAclRule": doAddAclRule,
@@ -5932,7 +6325,7 @@ ACTION_MAP = {
5932
6325
  "DescribeCfwEips": doDescribeCfwEips,
5933
6326
  "DescribeBlockIgnoreList": doDescribeBlockIgnoreList,
5934
6327
  "RemoveNatAcRule": doRemoveNatAcRule,
5935
- "DescribeAssetSync": doDescribeAssetSync,
6328
+ "DescribeAcLists": doDescribeAcLists,
5936
6329
  "DescribeLogStorageStatistic": doDescribeLogStorageStatistic,
5937
6330
  "ExpandCfwVertical": doExpandCfwVertical,
5938
6331
  "CreateVpcFwGroup": doCreateVpcFwGroup,
@@ -5963,7 +6356,6 @@ ACTION_MAP = {
5963
6356
  "AddNatAcRule": doAddNatAcRule,
5964
6357
  "DescribeBlockStaticList": doDescribeBlockStaticList,
5965
6358
  "DescribeFwEdgeIps": doDescribeFwEdgeIps,
5966
- "DescribeAcLists": doDescribeAcLists,
5967
6359
 
5968
6360
  }
5969
6361