tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/clb/clb_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doDescribeCustomizedConfigAssociateList(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDescribeCustomizedConfigAssociateList(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doInquiryPriceModifyLoadBalancer(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doInquiryPriceModifyLoadBalancer(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doBatchDeregisterTargets(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doBatchDeregisterTargets(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doDescribeExclusiveClusters(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doDescribeExclusiveClusters(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doAutoRewrite(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doAutoRewrite(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doModifyTargetGroupInstancesWeight(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doModifyTargetGroupInstancesWeight(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -329,58 +347,6 @@ def doModifyTargetGroupInstancesWeight(args, parsed_globals):
|
|
|
329
347
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
348
|
|
|
331
349
|
|
|
332
|
-
def doAssociateCustomizedConfig(args, parsed_globals):
|
|
333
|
-
g_param = parse_global_arg(parsed_globals)
|
|
334
|
-
|
|
335
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
336
|
-
cred = credential.CVMRoleCredential()
|
|
337
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
338
|
-
cred = credential.STSAssumeRoleCredential(
|
|
339
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
|
-
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
|
-
else:
|
|
345
|
-
cred = credential.Credential(
|
|
346
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
347
|
-
)
|
|
348
|
-
http_profile = HttpProfile(
|
|
349
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
350
|
-
reqMethod="POST",
|
|
351
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
|
-
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
355
|
-
if g_param[OptionsDefine.Language]:
|
|
356
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
357
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
|
-
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
-
model = models.AssociateCustomizedConfigRequest()
|
|
362
|
-
model.from_json_string(json.dumps(args))
|
|
363
|
-
start_time = time.time()
|
|
364
|
-
while True:
|
|
365
|
-
rsp = client.AssociateCustomizedConfig(model)
|
|
366
|
-
result = rsp.to_json_string()
|
|
367
|
-
try:
|
|
368
|
-
json_obj = json.loads(result)
|
|
369
|
-
except TypeError as e:
|
|
370
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
371
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
372
|
-
break
|
|
373
|
-
cur_time = time.time()
|
|
374
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
375
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
376
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
377
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
378
|
-
else:
|
|
379
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
380
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
381
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
|
-
|
|
383
|
-
|
|
384
350
|
def doDeregisterTargetsFromClassicalLB(args, parsed_globals):
|
|
385
351
|
g_param = parse_global_arg(parsed_globals)
|
|
386
352
|
|
|
@@ -391,7 +357,10 @@ def doDeregisterTargetsFromClassicalLB(args, parsed_globals):
|
|
|
391
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
359
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
365
|
else:
|
|
397
366
|
cred = credential.Credential(
|
|
@@ -403,7 +372,7 @@ def doDeregisterTargetsFromClassicalLB(args, parsed_globals):
|
|
|
403
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
374
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
376
|
if g_param[OptionsDefine.Language]:
|
|
408
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +412,10 @@ def doDescribeLoadBalancersDetail(args, parsed_globals):
|
|
|
443
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
414
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
420
|
else:
|
|
449
421
|
cred = credential.Credential(
|
|
@@ -455,7 +427,7 @@ def doDescribeLoadBalancersDetail(args, parsed_globals):
|
|
|
455
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
429
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
431
|
if g_param[OptionsDefine.Language]:
|
|
460
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +467,10 @@ def doAssociateTargetGroups(args, parsed_globals):
|
|
|
495
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
469
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
475
|
else:
|
|
501
476
|
cred = credential.Credential(
|
|
@@ -507,7 +482,7 @@ def doAssociateTargetGroups(args, parsed_globals):
|
|
|
507
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
484
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
486
|
if g_param[OptionsDefine.Language]:
|
|
512
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +522,10 @@ def doDeregisterTargetGroupInstances(args, parsed_globals):
|
|
|
547
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
524
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
530
|
else:
|
|
553
531
|
cred = credential.Credential(
|
|
@@ -559,7 +537,7 @@ def doDeregisterTargetGroupInstances(args, parsed_globals):
|
|
|
559
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
539
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
541
|
if g_param[OptionsDefine.Language]:
|
|
564
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +577,10 @@ def doDescribeListeners(args, parsed_globals):
|
|
|
599
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
579
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
585
|
else:
|
|
605
586
|
cred = credential.Credential(
|
|
@@ -611,7 +592,7 @@ def doDescribeListeners(args, parsed_globals):
|
|
|
611
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
594
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
596
|
if g_param[OptionsDefine.Language]:
|
|
616
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +632,10 @@ def doCreateTopic(args, parsed_globals):
|
|
|
651
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
634
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
640
|
else:
|
|
657
641
|
cred = credential.Credential(
|
|
@@ -663,7 +647,7 @@ def doCreateTopic(args, parsed_globals):
|
|
|
663
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
649
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
651
|
if g_param[OptionsDefine.Language]:
|
|
668
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +687,10 @@ def doModifyLoadBalancersProject(args, parsed_globals):
|
|
|
703
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
689
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
695
|
else:
|
|
709
696
|
cred = credential.Credential(
|
|
@@ -715,7 +702,7 @@ def doModifyLoadBalancersProject(args, parsed_globals):
|
|
|
715
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
704
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
706
|
if g_param[OptionsDefine.Language]:
|
|
720
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +742,10 @@ def doSetCustomizedConfigForLoadBalancer(args, parsed_globals):
|
|
|
755
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
744
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
750
|
else:
|
|
761
751
|
cred = credential.Credential(
|
|
@@ -767,7 +757,7 @@ def doSetCustomizedConfigForLoadBalancer(args, parsed_globals):
|
|
|
767
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
759
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
761
|
if g_param[OptionsDefine.Language]:
|
|
772
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +797,10 @@ def doRegisterTargetsWithClassicalLB(args, parsed_globals):
|
|
|
807
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
799
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
805
|
else:
|
|
813
806
|
cred = credential.Credential(
|
|
@@ -819,7 +812,7 @@ def doRegisterTargetsWithClassicalLB(args, parsed_globals):
|
|
|
819
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
814
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
816
|
if g_param[OptionsDefine.Language]:
|
|
824
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +852,10 @@ def doDeregisterTargets(args, parsed_globals):
|
|
|
859
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
854
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
860
|
else:
|
|
865
861
|
cred = credential.Credential(
|
|
@@ -871,7 +867,7 @@ def doDeregisterTargets(args, parsed_globals):
|
|
|
871
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
869
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
871
|
if g_param[OptionsDefine.Language]:
|
|
876
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +907,10 @@ def doModifyLoadBalancerAttributes(args, parsed_globals):
|
|
|
911
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
909
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
915
|
else:
|
|
917
916
|
cred = credential.Credential(
|
|
@@ -923,7 +922,7 @@ def doModifyLoadBalancerAttributes(args, parsed_globals):
|
|
|
923
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
924
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
926
|
if g_param[OptionsDefine.Language]:
|
|
928
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +962,10 @@ def doModifyTargetGroupInstancesPort(args, parsed_globals):
|
|
|
963
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
964
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
970
|
else:
|
|
969
971
|
cred = credential.Credential(
|
|
@@ -975,7 +977,7 @@ def doModifyTargetGroupInstancesPort(args, parsed_globals):
|
|
|
975
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
979
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
981
|
if g_param[OptionsDefine.Language]:
|
|
980
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1017,10 @@ def doBatchModifyTargetWeight(args, parsed_globals):
|
|
|
1015
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1019
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1025
|
else:
|
|
1021
1026
|
cred = credential.Credential(
|
|
@@ -1027,7 +1032,7 @@ def doBatchModifyTargetWeight(args, parsed_globals):
|
|
|
1027
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1034
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1036
|
if g_param[OptionsDefine.Language]:
|
|
1032
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1072,10 @@ def doDeleteRewrite(args, parsed_globals):
|
|
|
1067
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1074
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1080
|
else:
|
|
1073
1081
|
cred = credential.Credential(
|
|
@@ -1079,7 +1087,7 @@ def doDeleteRewrite(args, parsed_globals):
|
|
|
1079
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1089
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1091
|
if g_param[OptionsDefine.Language]:
|
|
1084
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1109,58 +1117,6 @@ def doDeleteRewrite(args, parsed_globals):
|
|
|
1109
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1118
|
|
|
1111
1119
|
|
|
1112
|
-
def doDisassociateCustomizedConfig(args, parsed_globals):
|
|
1113
|
-
g_param = parse_global_arg(parsed_globals)
|
|
1114
|
-
|
|
1115
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1116
|
-
cred = credential.CVMRoleCredential()
|
|
1117
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1118
|
-
cred = credential.STSAssumeRoleCredential(
|
|
1119
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
|
-
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
|
-
else:
|
|
1125
|
-
cred = credential.Credential(
|
|
1126
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1127
|
-
)
|
|
1128
|
-
http_profile = HttpProfile(
|
|
1129
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1130
|
-
reqMethod="POST",
|
|
1131
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
|
-
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1135
|
-
if g_param[OptionsDefine.Language]:
|
|
1136
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
1137
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1138
|
-
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.DisassociateCustomizedConfigRequest()
|
|
1142
|
-
model.from_json_string(json.dumps(args))
|
|
1143
|
-
start_time = time.time()
|
|
1144
|
-
while True:
|
|
1145
|
-
rsp = client.DisassociateCustomizedConfig(model)
|
|
1146
|
-
result = rsp.to_json_string()
|
|
1147
|
-
try:
|
|
1148
|
-
json_obj = json.loads(result)
|
|
1149
|
-
except TypeError as e:
|
|
1150
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1151
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1152
|
-
break
|
|
1153
|
-
cur_time = time.time()
|
|
1154
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1155
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1156
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1157
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1158
|
-
else:
|
|
1159
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1160
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1161
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1162
|
-
|
|
1163
|
-
|
|
1164
1120
|
def doSetLoadBalancerSecurityGroups(args, parsed_globals):
|
|
1165
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
1166
1122
|
|
|
@@ -1171,7 +1127,10 @@ def doSetLoadBalancerSecurityGroups(args, parsed_globals):
|
|
|
1171
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1129
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1135
|
else:
|
|
1177
1136
|
cred = credential.Credential(
|
|
@@ -1183,7 +1142,7 @@ def doSetLoadBalancerSecurityGroups(args, parsed_globals):
|
|
|
1183
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1144
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1146
|
if g_param[OptionsDefine.Language]:
|
|
1188
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1182,10 @@ def doInquiryPriceRefundLoadBalancer(args, parsed_globals):
|
|
|
1223
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1184
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1190
|
else:
|
|
1229
1191
|
cred = credential.Credential(
|
|
@@ -1235,7 +1197,7 @@ def doInquiryPriceRefundLoadBalancer(args, parsed_globals):
|
|
|
1235
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1199
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1201
|
if g_param[OptionsDefine.Language]:
|
|
1240
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1237,10 @@ def doDeleteListener(args, parsed_globals):
|
|
|
1275
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1239
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1245
|
else:
|
|
1281
1246
|
cred = credential.Credential(
|
|
@@ -1287,7 +1252,7 @@ def doDeleteListener(args, parsed_globals):
|
|
|
1287
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1254
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1256
|
if g_param[OptionsDefine.Language]:
|
|
1292
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1292,10 @@ def doSetSecurityGroupForLoadbalancers(args, parsed_globals):
|
|
|
1327
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1294
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1300
|
else:
|
|
1333
1301
|
cred = credential.Credential(
|
|
@@ -1339,7 +1307,7 @@ def doSetSecurityGroupForLoadbalancers(args, parsed_globals):
|
|
|
1339
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1309
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1311
|
if g_param[OptionsDefine.Language]:
|
|
1344
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1347,10 @@ def doRegisterTargetGroupInstances(args, parsed_globals):
|
|
|
1379
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1349
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1355
|
else:
|
|
1385
1356
|
cred = credential.Credential(
|
|
@@ -1391,7 +1362,7 @@ def doRegisterTargetGroupInstances(args, parsed_globals):
|
|
|
1391
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1364
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1366
|
if g_param[OptionsDefine.Language]:
|
|
1396
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1402,10 @@ def doSetLoadBalancerStartStatus(args, parsed_globals):
|
|
|
1431
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1404
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1410
|
else:
|
|
1437
1411
|
cred = credential.Credential(
|
|
@@ -1443,7 +1417,7 @@ def doSetLoadBalancerStartStatus(args, parsed_globals):
|
|
|
1443
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1419
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1421
|
if g_param[OptionsDefine.Language]:
|
|
1448
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1457,10 @@ def doModifyListener(args, parsed_globals):
|
|
|
1483
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1459
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1465
|
else:
|
|
1489
1466
|
cred = credential.Credential(
|
|
@@ -1495,7 +1472,7 @@ def doModifyListener(args, parsed_globals):
|
|
|
1495
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1474
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1476
|
if g_param[OptionsDefine.Language]:
|
|
1500
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1525,58 +1502,6 @@ def doModifyListener(args, parsed_globals):
|
|
|
1525
1502
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1526
1503
|
|
|
1527
1504
|
|
|
1528
|
-
def doDeleteCustomizedConfig(args, parsed_globals):
|
|
1529
|
-
g_param = parse_global_arg(parsed_globals)
|
|
1530
|
-
|
|
1531
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1532
|
-
cred = credential.CVMRoleCredential()
|
|
1533
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1534
|
-
cred = credential.STSAssumeRoleCredential(
|
|
1535
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
|
-
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
|
-
else:
|
|
1541
|
-
cred = credential.Credential(
|
|
1542
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1543
|
-
)
|
|
1544
|
-
http_profile = HttpProfile(
|
|
1545
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1546
|
-
reqMethod="POST",
|
|
1547
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
|
-
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1551
|
-
if g_param[OptionsDefine.Language]:
|
|
1552
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
1553
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1554
|
-
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1555
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
1556
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1557
|
-
model = models.DeleteCustomizedConfigRequest()
|
|
1558
|
-
model.from_json_string(json.dumps(args))
|
|
1559
|
-
start_time = time.time()
|
|
1560
|
-
while True:
|
|
1561
|
-
rsp = client.DeleteCustomizedConfig(model)
|
|
1562
|
-
result = rsp.to_json_string()
|
|
1563
|
-
try:
|
|
1564
|
-
json_obj = json.loads(result)
|
|
1565
|
-
except TypeError as e:
|
|
1566
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1567
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1568
|
-
break
|
|
1569
|
-
cur_time = time.time()
|
|
1570
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1571
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1572
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1573
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1574
|
-
else:
|
|
1575
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1576
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1577
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
|
-
|
|
1579
|
-
|
|
1580
1505
|
def doDescribeResources(args, parsed_globals):
|
|
1581
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1582
1507
|
|
|
@@ -1587,7 +1512,10 @@ def doDescribeResources(args, parsed_globals):
|
|
|
1587
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1514
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1520
|
else:
|
|
1593
1521
|
cred = credential.Credential(
|
|
@@ -1599,7 +1527,7 @@ def doDescribeResources(args, parsed_globals):
|
|
|
1599
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1529
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1531
|
if g_param[OptionsDefine.Language]:
|
|
1604
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1567,10 @@ def doDescribeLBListeners(args, parsed_globals):
|
|
|
1639
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1569
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1575
|
else:
|
|
1645
1576
|
cred = credential.Credential(
|
|
@@ -1651,7 +1582,7 @@ def doDescribeLBListeners(args, parsed_globals):
|
|
|
1651
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1584
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1586
|
if g_param[OptionsDefine.Language]:
|
|
1656
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1622,10 @@ def doBatchRegisterTargets(args, parsed_globals):
|
|
|
1691
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1624
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1630
|
else:
|
|
1697
1631
|
cred = credential.Credential(
|
|
@@ -1703,7 +1637,7 @@ def doBatchRegisterTargets(args, parsed_globals):
|
|
|
1703
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1639
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1641
|
if g_param[OptionsDefine.Language]:
|
|
1708
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +1677,10 @@ def doRegisterFunctionTargets(args, parsed_globals):
|
|
|
1743
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1679
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1685
|
else:
|
|
1749
1686
|
cred = credential.Credential(
|
|
@@ -1755,7 +1692,7 @@ def doRegisterFunctionTargets(args, parsed_globals):
|
|
|
1755
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1694
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1696
|
if g_param[OptionsDefine.Language]:
|
|
1760
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +1732,10 @@ def doDescribeCustomizedConfigList(args, parsed_globals):
|
|
|
1795
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1734
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1740
|
else:
|
|
1801
1741
|
cred = credential.Credential(
|
|
@@ -1807,7 +1747,7 @@ def doDescribeCustomizedConfigList(args, parsed_globals):
|
|
|
1807
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1749
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1751
|
if g_param[OptionsDefine.Language]:
|
|
1812
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +1787,10 @@ def doDescribeClusterResources(args, parsed_globals):
|
|
|
1847
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
1789
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
1795
|
else:
|
|
1853
1796
|
cred = credential.Credential(
|
|
@@ -1859,7 +1802,7 @@ def doDescribeClusterResources(args, parsed_globals):
|
|
|
1859
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
1804
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
1806
|
if g_param[OptionsDefine.Language]:
|
|
1864
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +1842,10 @@ def doSetLoadBalancerClsLog(args, parsed_globals):
|
|
|
1899
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
1844
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
1850
|
else:
|
|
1905
1851
|
cred = credential.Credential(
|
|
@@ -1911,7 +1857,7 @@ def doSetLoadBalancerClsLog(args, parsed_globals):
|
|
|
1911
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
1859
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
1861
|
if g_param[OptionsDefine.Language]:
|
|
1916
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +1897,10 @@ def doModifyBlockIPList(args, parsed_globals):
|
|
|
1951
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
1899
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
1905
|
else:
|
|
1957
1906
|
cred = credential.Credential(
|
|
@@ -1963,7 +1912,7 @@ def doModifyBlockIPList(args, parsed_globals):
|
|
|
1963
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
1914
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
1916
|
if g_param[OptionsDefine.Language]:
|
|
1968
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +1952,10 @@ def doDescribeRewrite(args, parsed_globals):
|
|
|
2003
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
1954
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
1960
|
else:
|
|
2009
1961
|
cred = credential.Credential(
|
|
@@ -2015,7 +1967,7 @@ def doDescribeRewrite(args, parsed_globals):
|
|
|
2015
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
1969
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
1971
|
if g_param[OptionsDefine.Language]:
|
|
2020
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2007,10 @@ def doModifyTargetPort(args, parsed_globals):
|
|
|
2055
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2009
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2015
|
else:
|
|
2061
2016
|
cred = credential.Credential(
|
|
@@ -2067,7 +2022,7 @@ def doModifyTargetPort(args, parsed_globals):
|
|
|
2067
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2024
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2026
|
if g_param[OptionsDefine.Language]:
|
|
2072
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2062,10 @@ def doDeregisterFunctionTargets(args, parsed_globals):
|
|
|
2107
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2064
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2070
|
else:
|
|
2113
2071
|
cred = credential.Credential(
|
|
@@ -2119,7 +2077,7 @@ def doDeregisterFunctionTargets(args, parsed_globals):
|
|
|
2119
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2079
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2081
|
if g_param[OptionsDefine.Language]:
|
|
2124
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2117,10 @@ def doModifyLoadBalancerSla(args, parsed_globals):
|
|
|
2159
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2119
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2125
|
else:
|
|
2165
2126
|
cred = credential.Credential(
|
|
@@ -2171,7 +2132,7 @@ def doModifyLoadBalancerSla(args, parsed_globals):
|
|
|
2171
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2134
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2136
|
if g_param[OptionsDefine.Language]:
|
|
2176
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2172,10 @@ def doModifyRule(args, parsed_globals):
|
|
|
2211
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2174
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2180
|
else:
|
|
2217
2181
|
cred = credential.Credential(
|
|
@@ -2223,7 +2187,7 @@ def doModifyRule(args, parsed_globals):
|
|
|
2223
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2189
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2191
|
if g_param[OptionsDefine.Language]:
|
|
2228
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2227,10 @@ def doDescribeBlockIPTask(args, parsed_globals):
|
|
|
2263
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2229
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2235
|
else:
|
|
2269
2236
|
cred = credential.Credential(
|
|
@@ -2275,7 +2242,7 @@ def doDescribeBlockIPTask(args, parsed_globals):
|
|
|
2275
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2244
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2246
|
if g_param[OptionsDefine.Language]:
|
|
2280
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2282,10 @@ def doDescribeClassicalLBByInstanceId(args, parsed_globals):
|
|
|
2315
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2284
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2290
|
else:
|
|
2321
2291
|
cred = credential.Credential(
|
|
@@ -2327,7 +2297,7 @@ def doDescribeClassicalLBByInstanceId(args, parsed_globals):
|
|
|
2327
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2299
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2301
|
if g_param[OptionsDefine.Language]:
|
|
2332
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2337,10 @@ def doDescribeLoadBalancerTraffic(args, parsed_globals):
|
|
|
2367
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2339
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2345
|
else:
|
|
2373
2346
|
cred = credential.Credential(
|
|
@@ -2379,7 +2352,7 @@ def doDescribeLoadBalancerTraffic(args, parsed_globals):
|
|
|
2379
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2354
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2356
|
if g_param[OptionsDefine.Language]:
|
|
2384
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2392,10 @@ def doDescribeCrossTargets(args, parsed_globals):
|
|
|
2419
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2394
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2400
|
else:
|
|
2425
2401
|
cred = credential.Credential(
|
|
@@ -2431,7 +2407,7 @@ def doDescribeCrossTargets(args, parsed_globals):
|
|
|
2431
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2409
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2411
|
if g_param[OptionsDefine.Language]:
|
|
2436
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2447,10 @@ def doDescribeTargetHealth(args, parsed_globals):
|
|
|
2471
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2449
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2455
|
else:
|
|
2477
2456
|
cred = credential.Credential(
|
|
@@ -2483,7 +2462,7 @@ def doDescribeTargetHealth(args, parsed_globals):
|
|
|
2483
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2464
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2466
|
if g_param[OptionsDefine.Language]:
|
|
2488
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2502,10 @@ def doManualRewrite(args, parsed_globals):
|
|
|
2523
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2504
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2510
|
else:
|
|
2529
2511
|
cred = credential.Credential(
|
|
@@ -2535,7 +2517,7 @@ def doManualRewrite(args, parsed_globals):
|
|
|
2535
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2519
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2521
|
if g_param[OptionsDefine.Language]:
|
|
2540
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2557,10 @@ def doModifyFunctionTargets(args, parsed_globals):
|
|
|
2575
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2559
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2565
|
else:
|
|
2581
2566
|
cred = credential.Credential(
|
|
@@ -2587,7 +2572,7 @@ def doModifyFunctionTargets(args, parsed_globals):
|
|
|
2587
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2574
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2576
|
if g_param[OptionsDefine.Language]:
|
|
2592
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2612,10 @@ def doDeleteLoadBalancerSnatIps(args, parsed_globals):
|
|
|
2627
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2614
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2620
|
else:
|
|
2633
2621
|
cred = credential.Credential(
|
|
@@ -2639,7 +2627,7 @@ def doDeleteLoadBalancerSnatIps(args, parsed_globals):
|
|
|
2639
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2629
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2631
|
if g_param[OptionsDefine.Language]:
|
|
2644
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2667,10 @@ def doModifyLoadBalancerMixIpTarget(args, parsed_globals):
|
|
|
2679
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2669
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2675
|
else:
|
|
2685
2676
|
cred = credential.Credential(
|
|
@@ -2691,7 +2682,7 @@ def doModifyLoadBalancerMixIpTarget(args, parsed_globals):
|
|
|
2691
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2684
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2686
|
if g_param[OptionsDefine.Language]:
|
|
2696
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +2722,10 @@ def doCreateRule(args, parsed_globals):
|
|
|
2731
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2724
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2730
|
else:
|
|
2737
2731
|
cred = credential.Credential(
|
|
@@ -2743,7 +2737,7 @@ def doCreateRule(args, parsed_globals):
|
|
|
2743
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2739
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2741
|
if g_param[OptionsDefine.Language]:
|
|
2748
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2773,58 +2767,6 @@ def doCreateRule(args, parsed_globals):
|
|
|
2773
2767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2774
2768
|
|
|
2775
2769
|
|
|
2776
|
-
def doAddCustomizedConfig(args, parsed_globals):
|
|
2777
|
-
g_param = parse_global_arg(parsed_globals)
|
|
2778
|
-
|
|
2779
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2780
|
-
cred = credential.CVMRoleCredential()
|
|
2781
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2782
|
-
cred = credential.STSAssumeRoleCredential(
|
|
2783
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
|
-
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
|
-
else:
|
|
2789
|
-
cred = credential.Credential(
|
|
2790
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2791
|
-
)
|
|
2792
|
-
http_profile = HttpProfile(
|
|
2793
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2794
|
-
reqMethod="POST",
|
|
2795
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
|
-
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2799
|
-
if g_param[OptionsDefine.Language]:
|
|
2800
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
2801
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2802
|
-
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2803
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
2804
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2805
|
-
model = models.AddCustomizedConfigRequest()
|
|
2806
|
-
model.from_json_string(json.dumps(args))
|
|
2807
|
-
start_time = time.time()
|
|
2808
|
-
while True:
|
|
2809
|
-
rsp = client.AddCustomizedConfig(model)
|
|
2810
|
-
result = rsp.to_json_string()
|
|
2811
|
-
try:
|
|
2812
|
-
json_obj = json.loads(result)
|
|
2813
|
-
except TypeError as e:
|
|
2814
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2815
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2816
|
-
break
|
|
2817
|
-
cur_time = time.time()
|
|
2818
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2819
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2820
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2821
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2822
|
-
else:
|
|
2823
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2824
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2825
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2826
|
-
|
|
2827
|
-
|
|
2828
2770
|
def doModifyDomain(args, parsed_globals):
|
|
2829
2771
|
g_param = parse_global_arg(parsed_globals)
|
|
2830
2772
|
|
|
@@ -2835,7 +2777,10 @@ def doModifyDomain(args, parsed_globals):
|
|
|
2835
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
2779
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
2785
|
else:
|
|
2841
2786
|
cred = credential.Credential(
|
|
@@ -2847,7 +2792,7 @@ def doModifyDomain(args, parsed_globals):
|
|
|
2847
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
2794
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
2796
|
if g_param[OptionsDefine.Language]:
|
|
2852
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +2832,10 @@ def doInquiryPriceRenewLoadBalancer(args, parsed_globals):
|
|
|
2887
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
2834
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
2840
|
else:
|
|
2893
2841
|
cred = credential.Credential(
|
|
@@ -2899,7 +2847,7 @@ def doInquiryPriceRenewLoadBalancer(args, parsed_globals):
|
|
|
2899
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
2849
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
2851
|
if g_param[OptionsDefine.Language]:
|
|
2904
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +2887,10 @@ def doDescribeLoadBalancerOverview(args, parsed_globals):
|
|
|
2939
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
2889
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
2895
|
else:
|
|
2945
2896
|
cred = credential.Credential(
|
|
@@ -2951,7 +2902,7 @@ def doDescribeLoadBalancerOverview(args, parsed_globals):
|
|
|
2951
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
2904
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
2906
|
if g_param[OptionsDefine.Language]:
|
|
2956
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +2942,10 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
|
2991
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
2944
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
2950
|
else:
|
|
2997
2951
|
cred = credential.Credential(
|
|
@@ -3003,7 +2957,7 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
|
3003
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
2959
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
2961
|
if g_param[OptionsDefine.Language]:
|
|
3008
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +2997,10 @@ def doInquiryPriceCreateLoadBalancer(args, parsed_globals):
|
|
|
3043
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
2999
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3005
|
else:
|
|
3049
3006
|
cred = credential.Credential(
|
|
@@ -3055,7 +3012,7 @@ def doInquiryPriceCreateLoadBalancer(args, parsed_globals):
|
|
|
3055
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3014
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3016
|
if g_param[OptionsDefine.Language]:
|
|
3060
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3052,10 @@ def doDeleteRule(args, parsed_globals):
|
|
|
3095
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3054
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3060
|
else:
|
|
3101
3061
|
cred = credential.Credential(
|
|
@@ -3107,7 +3067,7 @@ def doDeleteRule(args, parsed_globals):
|
|
|
3107
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3069
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3071
|
if g_param[OptionsDefine.Language]:
|
|
3112
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3137,58 +3097,6 @@ def doDeleteRule(args, parsed_globals):
|
|
|
3137
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3138
3098
|
|
|
3139
3099
|
|
|
3140
|
-
def doModifyCustomizedConfig(args, parsed_globals):
|
|
3141
|
-
g_param = parse_global_arg(parsed_globals)
|
|
3142
|
-
|
|
3143
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3144
|
-
cred = credential.CVMRoleCredential()
|
|
3145
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3146
|
-
cred = credential.STSAssumeRoleCredential(
|
|
3147
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
|
-
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
|
-
else:
|
|
3153
|
-
cred = credential.Credential(
|
|
3154
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3155
|
-
)
|
|
3156
|
-
http_profile = HttpProfile(
|
|
3157
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3158
|
-
reqMethod="POST",
|
|
3159
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
|
-
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
3163
|
-
if g_param[OptionsDefine.Language]:
|
|
3164
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
3165
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3166
|
-
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3167
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
3168
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3169
|
-
model = models.ModifyCustomizedConfigRequest()
|
|
3170
|
-
model.from_json_string(json.dumps(args))
|
|
3171
|
-
start_time = time.time()
|
|
3172
|
-
while True:
|
|
3173
|
-
rsp = client.ModifyCustomizedConfig(model)
|
|
3174
|
-
result = rsp.to_json_string()
|
|
3175
|
-
try:
|
|
3176
|
-
json_obj = json.loads(result)
|
|
3177
|
-
except TypeError as e:
|
|
3178
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3179
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3180
|
-
break
|
|
3181
|
-
cur_time = time.time()
|
|
3182
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3183
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3184
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3185
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3186
|
-
else:
|
|
3187
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3188
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3189
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3190
|
-
|
|
3191
|
-
|
|
3192
3100
|
def doDescribeTaskStatus(args, parsed_globals):
|
|
3193
3101
|
g_param = parse_global_arg(parsed_globals)
|
|
3194
3102
|
|
|
@@ -3199,7 +3107,10 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
3199
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3109
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3115
|
else:
|
|
3205
3116
|
cred = credential.Credential(
|
|
@@ -3211,7 +3122,7 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
3211
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3124
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3126
|
if g_param[OptionsDefine.Language]:
|
|
3216
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3162,10 @@ def doDescribeTargetGroupList(args, parsed_globals):
|
|
|
3251
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3164
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3170
|
else:
|
|
3257
3171
|
cred = credential.Credential(
|
|
@@ -3263,7 +3177,7 @@ def doDescribeTargetGroupList(args, parsed_globals):
|
|
|
3263
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3179
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3181
|
if g_param[OptionsDefine.Language]:
|
|
3268
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3217,10 @@ def doDescribeTargetGroups(args, parsed_globals):
|
|
|
3303
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3219
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3225
|
else:
|
|
3309
3226
|
cred = credential.Credential(
|
|
@@ -3315,7 +3232,7 @@ def doDescribeTargetGroups(args, parsed_globals):
|
|
|
3315
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3234
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3236
|
if g_param[OptionsDefine.Language]:
|
|
3320
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3272,10 @@ def doModifyTargetGroupAttribute(args, parsed_globals):
|
|
|
3355
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3274
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3280
|
else:
|
|
3361
3281
|
cred = credential.Credential(
|
|
@@ -3367,7 +3287,7 @@ def doModifyTargetGroupAttribute(args, parsed_globals):
|
|
|
3367
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3289
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3291
|
if g_param[OptionsDefine.Language]:
|
|
3372
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3327,10 @@ def doCreateClsLogSet(args, parsed_globals):
|
|
|
3407
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3329
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3335
|
else:
|
|
3413
3336
|
cred = credential.Credential(
|
|
@@ -3419,7 +3342,7 @@ def doCreateClsLogSet(args, parsed_globals):
|
|
|
3419
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3344
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3346
|
if g_param[OptionsDefine.Language]:
|
|
3424
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3382,10 @@ def doDescribeQuota(args, parsed_globals):
|
|
|
3459
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3384
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3390
|
else:
|
|
3465
3391
|
cred = credential.Credential(
|
|
@@ -3471,7 +3397,7 @@ def doDescribeQuota(args, parsed_globals):
|
|
|
3471
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3399
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3401
|
if g_param[OptionsDefine.Language]:
|
|
3476
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +3437,10 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
3511
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3439
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3445
|
else:
|
|
3517
3446
|
cred = credential.Credential(
|
|
@@ -3523,7 +3452,7 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
3523
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3454
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3456
|
if g_param[OptionsDefine.Language]:
|
|
3528
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +3492,10 @@ def doDescribeIdleLoadBalancers(args, parsed_globals):
|
|
|
3563
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3494
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3500
|
else:
|
|
3569
3501
|
cred = credential.Credential(
|
|
@@ -3575,7 +3507,7 @@ def doDescribeIdleLoadBalancers(args, parsed_globals):
|
|
|
3575
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3509
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3511
|
if g_param[OptionsDefine.Language]:
|
|
3580
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +3547,10 @@ def doRegisterTargets(args, parsed_globals):
|
|
|
3615
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3549
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3555
|
else:
|
|
3621
3556
|
cred = credential.Credential(
|
|
@@ -3627,7 +3562,7 @@ def doRegisterTargets(args, parsed_globals):
|
|
|
3627
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
3564
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
3566
|
if g_param[OptionsDefine.Language]:
|
|
3632
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +3602,10 @@ def doDescribeClassicalLBListeners(args, parsed_globals):
|
|
|
3667
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
3604
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
3610
|
else:
|
|
3673
3611
|
cred = credential.Credential(
|
|
@@ -3679,7 +3617,7 @@ def doDescribeClassicalLBListeners(args, parsed_globals):
|
|
|
3679
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
3619
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
3621
|
if g_param[OptionsDefine.Language]:
|
|
3684
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +3657,10 @@ def doReplaceCertForLoadBalancers(args, parsed_globals):
|
|
|
3719
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
3659
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
3665
|
else:
|
|
3725
3666
|
cred = credential.Credential(
|
|
@@ -3731,7 +3672,7 @@ def doReplaceCertForLoadBalancers(args, parsed_globals):
|
|
|
3731
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
3674
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
3676
|
if g_param[OptionsDefine.Language]:
|
|
3736
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +3712,10 @@ def doDeleteLoadBalancerListeners(args, parsed_globals):
|
|
|
3771
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
3714
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
3720
|
else:
|
|
3777
3721
|
cred = credential.Credential(
|
|
@@ -3783,7 +3727,7 @@ def doDeleteLoadBalancerListeners(args, parsed_globals):
|
|
|
3783
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
3729
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
3731
|
if g_param[OptionsDefine.Language]:
|
|
3788
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +3767,10 @@ def doDeleteTargetGroups(args, parsed_globals):
|
|
|
3823
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
3769
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
3775
|
else:
|
|
3829
3776
|
cred = credential.Credential(
|
|
@@ -3835,7 +3782,7 @@ def doDeleteTargetGroups(args, parsed_globals):
|
|
|
3835
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
3784
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
3786
|
if g_param[OptionsDefine.Language]:
|
|
3840
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3875,7 +3822,10 @@ def doDescribeLoadBalancerListByCertId(args, parsed_globals):
|
|
|
3875
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
3824
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
3830
|
else:
|
|
3881
3831
|
cred = credential.Credential(
|
|
@@ -3887,7 +3837,7 @@ def doDescribeLoadBalancerListByCertId(args, parsed_globals):
|
|
|
3887
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
3839
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
3841
|
if g_param[OptionsDefine.Language]:
|
|
3892
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3927,7 +3877,10 @@ def doModifyDomainAttributes(args, parsed_globals):
|
|
|
3927
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
3879
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
3885
|
else:
|
|
3933
3886
|
cred = credential.Credential(
|
|
@@ -3939,7 +3892,7 @@ def doModifyDomainAttributes(args, parsed_globals):
|
|
|
3939
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
3894
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
3896
|
if g_param[OptionsDefine.Language]:
|
|
3944
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3979,7 +3932,10 @@ def doDisassociateTargetGroups(args, parsed_globals):
|
|
|
3979
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
3934
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
3940
|
else:
|
|
3985
3941
|
cred = credential.Credential(
|
|
@@ -3991,7 +3947,7 @@ def doDisassociateTargetGroups(args, parsed_globals):
|
|
|
3991
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
3949
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
3951
|
if g_param[OptionsDefine.Language]:
|
|
3996
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4031,7 +3987,10 @@ def doDescribeLoadBalancers(args, parsed_globals):
|
|
|
4031
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
3989
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
3995
|
else:
|
|
4037
3996
|
cred = credential.Credential(
|
|
@@ -4043,7 +4002,7 @@ def doDescribeLoadBalancers(args, parsed_globals):
|
|
|
4043
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4004
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4006
|
if g_param[OptionsDefine.Language]:
|
|
4048
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4083,7 +4042,10 @@ def doDescribeBlockIPList(args, parsed_globals):
|
|
|
4083
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4044
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4050
|
else:
|
|
4089
4051
|
cred = credential.Credential(
|
|
@@ -4095,7 +4057,7 @@ def doDescribeBlockIPList(args, parsed_globals):
|
|
|
4095
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4059
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4061
|
if g_param[OptionsDefine.Language]:
|
|
4100
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4135,7 +4097,10 @@ def doDescribeClassicalLBTargets(args, parsed_globals):
|
|
|
4135
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4099
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4105
|
else:
|
|
4141
4106
|
cred = credential.Credential(
|
|
@@ -4147,7 +4112,7 @@ def doDescribeClassicalLBTargets(args, parsed_globals):
|
|
|
4147
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4114
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4116
|
if g_param[OptionsDefine.Language]:
|
|
4152
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4187,7 +4152,10 @@ def doCreateListener(args, parsed_globals):
|
|
|
4187
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4154
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4160
|
else:
|
|
4193
4161
|
cred = credential.Credential(
|
|
@@ -4199,7 +4167,7 @@ def doCreateListener(args, parsed_globals):
|
|
|
4199
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4169
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4171
|
if g_param[OptionsDefine.Language]:
|
|
4204
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4239,7 +4207,10 @@ def doDescribeLBOperateProtect(args, parsed_globals):
|
|
|
4239
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4209
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4215
|
else:
|
|
4245
4216
|
cred = credential.Credential(
|
|
@@ -4251,7 +4222,7 @@ def doDescribeLBOperateProtect(args, parsed_globals):
|
|
|
4251
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4224
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4226
|
if g_param[OptionsDefine.Language]:
|
|
4256
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4291,7 +4262,10 @@ def doDescribeClsLogSet(args, parsed_globals):
|
|
|
4291
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4264
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4270
|
else:
|
|
4297
4271
|
cred = credential.Credential(
|
|
@@ -4303,7 +4277,7 @@ def doDescribeClsLogSet(args, parsed_globals):
|
|
|
4303
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4279
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4281
|
if g_param[OptionsDefine.Language]:
|
|
4308
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4343,7 +4317,10 @@ def doModifyTargetWeight(args, parsed_globals):
|
|
|
4343
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4319
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4325
|
else:
|
|
4349
4326
|
cred = credential.Credential(
|
|
@@ -4355,7 +4332,7 @@ def doModifyTargetWeight(args, parsed_globals):
|
|
|
4355
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4334
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4336
|
if g_param[OptionsDefine.Language]:
|
|
4360
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4395,7 +4372,10 @@ def doCreateTargetGroup(args, parsed_globals):
|
|
|
4395
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4374
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4380
|
else:
|
|
4401
4381
|
cred = credential.Credential(
|
|
@@ -4407,7 +4387,7 @@ def doCreateTargetGroup(args, parsed_globals):
|
|
|
4407
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4389
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4391
|
if g_param[OptionsDefine.Language]:
|
|
4412
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +4427,10 @@ def doDescribeTargets(args, parsed_globals):
|
|
|
4447
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4429
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4435
|
else:
|
|
4453
4436
|
cred = credential.Credential(
|
|
@@ -4459,7 +4442,7 @@ def doDescribeTargets(args, parsed_globals):
|
|
|
4459
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
4444
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
4446
|
if g_param[OptionsDefine.Language]:
|
|
4464
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4499,7 +4482,10 @@ def doMigrateClassicalLoadBalancers(args, parsed_globals):
|
|
|
4499
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4484
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4490
|
else:
|
|
4505
4491
|
cred = credential.Credential(
|
|
@@ -4511,7 +4497,7 @@ def doMigrateClassicalLoadBalancers(args, parsed_globals):
|
|
|
4511
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
4499
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
4501
|
if g_param[OptionsDefine.Language]:
|
|
4516
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4551,7 +4537,10 @@ def doDescribeClassicalLBHealthStatus(args, parsed_globals):
|
|
|
4551
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
4539
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
4545
|
else:
|
|
4557
4546
|
cred = credential.Credential(
|
|
@@ -4563,7 +4552,7 @@ def doDescribeClassicalLBHealthStatus(args, parsed_globals):
|
|
|
4563
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
4554
|
)
|
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4567
4556
|
if g_param[OptionsDefine.Language]:
|
|
4568
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4569
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4603,7 +4592,10 @@ def doCreateLoadBalancerSnatIps(args, parsed_globals):
|
|
|
4603
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
4594
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
4600
|
else:
|
|
4609
4601
|
cred = credential.Credential(
|
|
@@ -4615,7 +4607,7 @@ def doCreateLoadBalancerSnatIps(args, parsed_globals):
|
|
|
4615
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4616
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4617
4609
|
)
|
|
4618
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4619
4611
|
if g_param[OptionsDefine.Language]:
|
|
4620
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4621
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4655,7 +4647,10 @@ def doDescribeTargetGroupInstances(args, parsed_globals):
|
|
|
4655
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
4649
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
4655
|
else:
|
|
4661
4656
|
cred = credential.Credential(
|
|
@@ -4667,7 +4662,7 @@ def doDescribeTargetGroupInstances(args, parsed_globals):
|
|
|
4667
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4668
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4669
4664
|
)
|
|
4670
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4671
4666
|
if g_param[OptionsDefine.Language]:
|
|
4672
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4673
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4707,7 +4702,10 @@ def doCloneLoadBalancer(args, parsed_globals):
|
|
|
4707
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4708
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4709
4704
|
)
|
|
4710
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
4710
|
else:
|
|
4713
4711
|
cred = credential.Credential(
|
|
@@ -4719,7 +4717,7 @@ def doCloneLoadBalancer(args, parsed_globals):
|
|
|
4719
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4720
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4721
4719
|
)
|
|
4722
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4723
4721
|
if g_param[OptionsDefine.Language]:
|
|
4724
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4725
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4759,7 +4757,10 @@ def doBatchModifyTargetTag(args, parsed_globals):
|
|
|
4759
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
4759
|
)
|
|
4762
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
4765
|
else:
|
|
4765
4766
|
cred = credential.Credential(
|
|
@@ -4771,7 +4772,7 @@ def doBatchModifyTargetTag(args, parsed_globals):
|
|
|
4771
4772
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4772
4773
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4773
4774
|
)
|
|
4774
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4775
4776
|
if g_param[OptionsDefine.Language]:
|
|
4776
4777
|
profile.language = g_param[OptionsDefine.Language]
|
|
4777
4778
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4818,7 +4819,6 @@ ACTION_MAP = {
|
|
|
4818
4819
|
"DescribeExclusiveClusters": doDescribeExclusiveClusters,
|
|
4819
4820
|
"AutoRewrite": doAutoRewrite,
|
|
4820
4821
|
"ModifyTargetGroupInstancesWeight": doModifyTargetGroupInstancesWeight,
|
|
4821
|
-
"AssociateCustomizedConfig": doAssociateCustomizedConfig,
|
|
4822
4822
|
"DeregisterTargetsFromClassicalLB": doDeregisterTargetsFromClassicalLB,
|
|
4823
4823
|
"DescribeLoadBalancersDetail": doDescribeLoadBalancersDetail,
|
|
4824
4824
|
"AssociateTargetGroups": doAssociateTargetGroups,
|
|
@@ -4833,7 +4833,6 @@ ACTION_MAP = {
|
|
|
4833
4833
|
"ModifyTargetGroupInstancesPort": doModifyTargetGroupInstancesPort,
|
|
4834
4834
|
"BatchModifyTargetWeight": doBatchModifyTargetWeight,
|
|
4835
4835
|
"DeleteRewrite": doDeleteRewrite,
|
|
4836
|
-
"DisassociateCustomizedConfig": doDisassociateCustomizedConfig,
|
|
4837
4836
|
"SetLoadBalancerSecurityGroups": doSetLoadBalancerSecurityGroups,
|
|
4838
4837
|
"InquiryPriceRefundLoadBalancer": doInquiryPriceRefundLoadBalancer,
|
|
4839
4838
|
"DeleteListener": doDeleteListener,
|
|
@@ -4841,7 +4840,6 @@ ACTION_MAP = {
|
|
|
4841
4840
|
"RegisterTargetGroupInstances": doRegisterTargetGroupInstances,
|
|
4842
4841
|
"SetLoadBalancerStartStatus": doSetLoadBalancerStartStatus,
|
|
4843
4842
|
"ModifyListener": doModifyListener,
|
|
4844
|
-
"DeleteCustomizedConfig": doDeleteCustomizedConfig,
|
|
4845
4843
|
"DescribeResources": doDescribeResources,
|
|
4846
4844
|
"DescribeLBListeners": doDescribeLBListeners,
|
|
4847
4845
|
"BatchRegisterTargets": doBatchRegisterTargets,
|
|
@@ -4865,14 +4863,12 @@ ACTION_MAP = {
|
|
|
4865
4863
|
"DeleteLoadBalancerSnatIps": doDeleteLoadBalancerSnatIps,
|
|
4866
4864
|
"ModifyLoadBalancerMixIpTarget": doModifyLoadBalancerMixIpTarget,
|
|
4867
4865
|
"CreateRule": doCreateRule,
|
|
4868
|
-
"AddCustomizedConfig": doAddCustomizedConfig,
|
|
4869
4866
|
"ModifyDomain": doModifyDomain,
|
|
4870
4867
|
"InquiryPriceRenewLoadBalancer": doInquiryPriceRenewLoadBalancer,
|
|
4871
4868
|
"DescribeLoadBalancerOverview": doDescribeLoadBalancerOverview,
|
|
4872
4869
|
"DeleteLoadBalancer": doDeleteLoadBalancer,
|
|
4873
4870
|
"InquiryPriceCreateLoadBalancer": doInquiryPriceCreateLoadBalancer,
|
|
4874
4871
|
"DeleteRule": doDeleteRule,
|
|
4875
|
-
"ModifyCustomizedConfig": doModifyCustomizedConfig,
|
|
4876
4872
|
"DescribeTaskStatus": doDescribeTaskStatus,
|
|
4877
4873
|
"DescribeTargetGroupList": doDescribeTargetGroupList,
|
|
4878
4874
|
"DescribeTargetGroups": doDescribeTargetGroups,
|