tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -27,7 +27,10 @@ def doModifyKafkaConsumer(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doModifyKafkaConsumer(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doCreateWebCallback(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doCreateWebCallback(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doDescribeExports(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doDescribeExports(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doDescribeConsoleSharingList(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doDescribeConsoleSharingList(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +247,10 @@ def doDeleteCloudProductLogCollection(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,7 +262,7 @@ def doDeleteCloudProductLogCollection(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +302,10 @@ def doCreateIndex(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doCreateIndex(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doQueryMetric(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doQueryMetric(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -381,7 +402,7 @@ def doQueryMetric(args, parsed_globals):
381
402
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
403
 
383
404
 
384
- def doModifyShipper(args, parsed_globals):
405
+ def doModifyDlcDeliver(args, parsed_globals):
385
406
  g_param = parse_global_arg(parsed_globals)
386
407
 
387
408
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -391,7 +412,10 @@ def doModifyShipper(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,18 +427,18 @@ def doModifyShipper(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
434
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
411
435
  client._sdkVersion += ("_CLI_" + __version__)
412
436
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.ModifyShipperRequest()
437
+ model = models.ModifyDlcDeliverRequest()
414
438
  model.from_json_string(json.dumps(args))
415
439
  start_time = time.time()
416
440
  while True:
417
- rsp = client.ModifyShipper(model)
441
+ rsp = client.ModifyDlcDeliver(model)
418
442
  result = rsp.to_json_string()
419
443
  try:
420
444
  json_obj = json.loads(result)
@@ -443,7 +467,10 @@ def doCreateKafkaRecharge(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,7 +482,7 @@ def doCreateKafkaRecharge(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +522,10 @@ def doDescribeConfigs(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,7 +537,7 @@ def doDescribeConfigs(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +577,10 @@ def doCreateDeliverCloudFunction(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,7 +592,7 @@ def doCreateDeliverCloudFunction(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +632,10 @@ def doDeleteLogset(args, parsed_globals):
599
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
634
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
640
  else:
605
641
  cred = credential.Credential(
@@ -611,7 +647,7 @@ def doDeleteLogset(args, parsed_globals):
611
647
  endpoint=g_param[OptionsDefine.Endpoint],
612
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
649
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
651
  if g_param[OptionsDefine.Language]:
616
652
  profile.language = g_param[OptionsDefine.Language]
617
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +687,10 @@ def doDeleteConfigFromMachineGroup(args, parsed_globals):
651
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
689
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
695
  else:
657
696
  cred = credential.Credential(
@@ -663,7 +702,7 @@ def doDeleteConfigFromMachineGroup(args, parsed_globals):
663
702
  endpoint=g_param[OptionsDefine.Endpoint],
664
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
704
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
706
  if g_param[OptionsDefine.Language]:
668
707
  profile.language = g_param[OptionsDefine.Language]
669
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +742,10 @@ def doDeleteDataTransform(args, parsed_globals):
703
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
744
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
750
  else:
709
751
  cred = credential.Credential(
@@ -715,7 +757,7 @@ def doDeleteDataTransform(args, parsed_globals):
715
757
  endpoint=g_param[OptionsDefine.Endpoint],
716
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
759
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
761
  if g_param[OptionsDefine.Language]:
720
762
  profile.language = g_param[OptionsDefine.Language]
721
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +797,10 @@ def doDeleteConfigExtra(args, parsed_globals):
755
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
799
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
805
  else:
761
806
  cred = credential.Credential(
@@ -767,7 +812,7 @@ def doDeleteConfigExtra(args, parsed_globals):
767
812
  endpoint=g_param[OptionsDefine.Endpoint],
768
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
814
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
816
  if g_param[OptionsDefine.Language]:
772
817
  profile.language = g_param[OptionsDefine.Language]
773
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +852,10 @@ def doCreateTopic(args, parsed_globals):
807
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
854
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
860
  else:
813
861
  cred = credential.Credential(
@@ -819,7 +867,7 @@ def doCreateTopic(args, parsed_globals):
819
867
  endpoint=g_param[OptionsDefine.Endpoint],
820
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
869
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
871
  if g_param[OptionsDefine.Language]:
824
872
  profile.language = g_param[OptionsDefine.Language]
825
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +907,10 @@ def doDescribeCloudProductLogTasks(args, parsed_globals):
859
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
909
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
915
  else:
865
916
  cred = credential.Credential(
@@ -871,7 +922,7 @@ def doDescribeCloudProductLogTasks(args, parsed_globals):
871
922
  endpoint=g_param[OptionsDefine.Endpoint],
872
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
924
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
926
  if g_param[OptionsDefine.Language]:
876
927
  profile.language = g_param[OptionsDefine.Language]
877
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +962,10 @@ def doDeleteAlarmNotice(args, parsed_globals):
911
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
964
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
970
  else:
917
971
  cred = credential.Credential(
@@ -923,7 +977,7 @@ def doDeleteAlarmNotice(args, parsed_globals):
923
977
  endpoint=g_param[OptionsDefine.Endpoint],
924
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
979
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
981
  if g_param[OptionsDefine.Language]:
928
982
  profile.language = g_param[OptionsDefine.Language]
929
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -963,7 +1017,10 @@ def doDescribeAlertRecordHistory(args, parsed_globals):
963
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1019
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1025
  else:
969
1026
  cred = credential.Credential(
@@ -975,7 +1032,7 @@ def doDescribeAlertRecordHistory(args, parsed_globals):
975
1032
  endpoint=g_param[OptionsDefine.Endpoint],
976
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1034
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1036
  if g_param[OptionsDefine.Language]:
980
1037
  profile.language = g_param[OptionsDefine.Language]
981
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1015,7 +1072,10 @@ def doDeleteKafkaRecharge(args, parsed_globals):
1015
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1074
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1080
  else:
1021
1081
  cred = credential.Credential(
@@ -1027,7 +1087,7 @@ def doDeleteKafkaRecharge(args, parsed_globals):
1027
1087
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1089
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1091
  if g_param[OptionsDefine.Language]:
1032
1092
  profile.language = g_param[OptionsDefine.Language]
1033
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1067,7 +1127,10 @@ def doCreateConfig(args, parsed_globals):
1067
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1129
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1135
  else:
1073
1136
  cred = credential.Credential(
@@ -1079,7 +1142,7 @@ def doCreateConfig(args, parsed_globals):
1079
1142
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1144
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1146
  if g_param[OptionsDefine.Language]:
1084
1147
  profile.language = g_param[OptionsDefine.Language]
1085
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1119,7 +1182,10 @@ def doDescribeLogsets(args, parsed_globals):
1119
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1184
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1190
  else:
1125
1191
  cred = credential.Credential(
@@ -1131,7 +1197,7 @@ def doDescribeLogsets(args, parsed_globals):
1131
1197
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1199
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1201
  if g_param[OptionsDefine.Language]:
1136
1202
  profile.language = g_param[OptionsDefine.Language]
1137
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1237,10 @@ def doDescribeTopics(args, parsed_globals):
1171
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1239
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1245
  else:
1177
1246
  cred = credential.Credential(
@@ -1183,7 +1252,7 @@ def doDescribeTopics(args, parsed_globals):
1183
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1254
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1256
  if g_param[OptionsDefine.Language]:
1188
1257
  profile.language = g_param[OptionsDefine.Language]
1189
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1292,10 @@ def doCreateCloudProductLogCollection(args, parsed_globals):
1223
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1294
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1300
  else:
1229
1301
  cred = credential.Credential(
@@ -1235,7 +1307,7 @@ def doCreateCloudProductLogCollection(args, parsed_globals):
1235
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1309
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1311
  if g_param[OptionsDefine.Language]:
1240
1312
  profile.language = g_param[OptionsDefine.Language]
1241
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1265,7 +1337,7 @@ def doCreateCloudProductLogCollection(args, parsed_globals):
1265
1337
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
1338
 
1267
1339
 
1268
- def doCreateAlarmNotice(args, parsed_globals):
1340
+ def doCreateCosRecharge(args, parsed_globals):
1269
1341
  g_param = parse_global_arg(parsed_globals)
1270
1342
 
1271
1343
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1275,7 +1347,10 @@ def doCreateAlarmNotice(args, parsed_globals):
1275
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1349
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1355
  else:
1281
1356
  cred = credential.Credential(
@@ -1287,18 +1362,18 @@ def doCreateAlarmNotice(args, parsed_globals):
1287
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1364
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1366
  if g_param[OptionsDefine.Language]:
1292
1367
  profile.language = g_param[OptionsDefine.Language]
1293
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1294
1369
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
1295
1370
  client._sdkVersion += ("_CLI_" + __version__)
1296
1371
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1297
- model = models.CreateAlarmNoticeRequest()
1372
+ model = models.CreateCosRechargeRequest()
1298
1373
  model.from_json_string(json.dumps(args))
1299
1374
  start_time = time.time()
1300
1375
  while True:
1301
- rsp = client.CreateAlarmNotice(model)
1376
+ rsp = client.CreateCosRecharge(model)
1302
1377
  result = rsp.to_json_string()
1303
1378
  try:
1304
1379
  json_obj = json.loads(result)
@@ -1317,7 +1392,7 @@ def doCreateAlarmNotice(args, parsed_globals):
1317
1392
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
1393
 
1319
1394
 
1320
- def doCreateCosRecharge(args, parsed_globals):
1395
+ def doMergePartition(args, parsed_globals):
1321
1396
  g_param = parse_global_arg(parsed_globals)
1322
1397
 
1323
1398
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1327,7 +1402,10 @@ def doCreateCosRecharge(args, parsed_globals):
1327
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1404
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1410
  else:
1333
1411
  cred = credential.Credential(
@@ -1339,18 +1417,18 @@ def doCreateCosRecharge(args, parsed_globals):
1339
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1419
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1421
  if g_param[OptionsDefine.Language]:
1344
1422
  profile.language = g_param[OptionsDefine.Language]
1345
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1346
1424
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
1347
1425
  client._sdkVersion += ("_CLI_" + __version__)
1348
1426
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1349
- model = models.CreateCosRechargeRequest()
1427
+ model = models.MergePartitionRequest()
1350
1428
  model.from_json_string(json.dumps(args))
1351
1429
  start_time = time.time()
1352
1430
  while True:
1353
- rsp = client.CreateCosRecharge(model)
1431
+ rsp = client.MergePartition(model)
1354
1432
  result = rsp.to_json_string()
1355
1433
  try:
1356
1434
  json_obj = json.loads(result)
@@ -1369,7 +1447,7 @@ def doCreateCosRecharge(args, parsed_globals):
1369
1447
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1370
1448
 
1371
1449
 
1372
- def doMergePartition(args, parsed_globals):
1450
+ def doModifyAlarmNotice(args, parsed_globals):
1373
1451
  g_param = parse_global_arg(parsed_globals)
1374
1452
 
1375
1453
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1379,7 +1457,10 @@ def doMergePartition(args, parsed_globals):
1379
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1459
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1465
  else:
1385
1466
  cred = credential.Credential(
@@ -1391,18 +1472,18 @@ def doMergePartition(args, parsed_globals):
1391
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1474
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1476
  if g_param[OptionsDefine.Language]:
1396
1477
  profile.language = g_param[OptionsDefine.Language]
1397
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1398
1479
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
1399
1480
  client._sdkVersion += ("_CLI_" + __version__)
1400
1481
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
- model = models.MergePartitionRequest()
1482
+ model = models.ModifyAlarmNoticeRequest()
1402
1483
  model.from_json_string(json.dumps(args))
1403
1484
  start_time = time.time()
1404
1485
  while True:
1405
- rsp = client.MergePartition(model)
1486
+ rsp = client.ModifyAlarmNotice(model)
1406
1487
  result = rsp.to_json_string()
1407
1488
  try:
1408
1489
  json_obj = json.loads(result)
@@ -1421,7 +1502,7 @@ def doMergePartition(args, parsed_globals):
1421
1502
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
1503
 
1423
1504
 
1424
- def doModifyAlarmNotice(args, parsed_globals):
1505
+ def doCreateExport(args, parsed_globals):
1425
1506
  g_param = parse_global_arg(parsed_globals)
1426
1507
 
1427
1508
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1431,7 +1512,10 @@ def doModifyAlarmNotice(args, parsed_globals):
1431
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1514
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1520
  else:
1437
1521
  cred = credential.Credential(
@@ -1443,18 +1527,18 @@ def doModifyAlarmNotice(args, parsed_globals):
1443
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1529
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1531
  if g_param[OptionsDefine.Language]:
1448
1532
  profile.language = g_param[OptionsDefine.Language]
1449
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1450
1534
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
1451
1535
  client._sdkVersion += ("_CLI_" + __version__)
1452
1536
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.ModifyAlarmNoticeRequest()
1537
+ model = models.CreateExportRequest()
1454
1538
  model.from_json_string(json.dumps(args))
1455
1539
  start_time = time.time()
1456
1540
  while True:
1457
- rsp = client.ModifyAlarmNotice(model)
1541
+ rsp = client.CreateExport(model)
1458
1542
  result = rsp.to_json_string()
1459
1543
  try:
1460
1544
  json_obj = json.loads(result)
@@ -1473,7 +1557,7 @@ def doModifyAlarmNotice(args, parsed_globals):
1473
1557
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1474
1558
 
1475
1559
 
1476
- def doCreateExport(args, parsed_globals):
1560
+ def doCloseKafkaConsumer(args, parsed_globals):
1477
1561
  g_param = parse_global_arg(parsed_globals)
1478
1562
 
1479
1563
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1483,7 +1567,10 @@ def doCreateExport(args, parsed_globals):
1483
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1569
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1575
  else:
1489
1576
  cred = credential.Credential(
@@ -1495,18 +1582,18 @@ def doCreateExport(args, parsed_globals):
1495
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1584
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1586
  if g_param[OptionsDefine.Language]:
1500
1587
  profile.language = g_param[OptionsDefine.Language]
1501
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1502
1589
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
1503
1590
  client._sdkVersion += ("_CLI_" + __version__)
1504
1591
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1505
- model = models.CreateExportRequest()
1592
+ model = models.CloseKafkaConsumerRequest()
1506
1593
  model.from_json_string(json.dumps(args))
1507
1594
  start_time = time.time()
1508
1595
  while True:
1509
- rsp = client.CreateExport(model)
1596
+ rsp = client.CloseKafkaConsumer(model)
1510
1597
  result = rsp.to_json_string()
1511
1598
  try:
1512
1599
  json_obj = json.loads(result)
@@ -1525,7 +1612,7 @@ def doCreateExport(args, parsed_globals):
1525
1612
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1526
1613
 
1527
1614
 
1528
- def doCloseKafkaConsumer(args, parsed_globals):
1615
+ def doCreateDlcDeliver(args, parsed_globals):
1529
1616
  g_param = parse_global_arg(parsed_globals)
1530
1617
 
1531
1618
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1535,7 +1622,10 @@ def doCloseKafkaConsumer(args, parsed_globals):
1535
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1624
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1630
  else:
1541
1631
  cred = credential.Credential(
@@ -1547,18 +1637,18 @@ def doCloseKafkaConsumer(args, parsed_globals):
1547
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1639
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1641
  if g_param[OptionsDefine.Language]:
1552
1642
  profile.language = g_param[OptionsDefine.Language]
1553
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1554
1644
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
1555
1645
  client._sdkVersion += ("_CLI_" + __version__)
1556
1646
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1557
- model = models.CloseKafkaConsumerRequest()
1647
+ model = models.CreateDlcDeliverRequest()
1558
1648
  model.from_json_string(json.dumps(args))
1559
1649
  start_time = time.time()
1560
1650
  while True:
1561
- rsp = client.CloseKafkaConsumer(model)
1651
+ rsp = client.CreateDlcDeliver(model)
1562
1652
  result = rsp.to_json_string()
1563
1653
  try:
1564
1654
  json_obj = json.loads(result)
@@ -1587,7 +1677,10 @@ def doModifyIndex(args, parsed_globals):
1587
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1679
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1685
  else:
1593
1686
  cred = credential.Credential(
@@ -1599,7 +1692,7 @@ def doModifyIndex(args, parsed_globals):
1599
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1694
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1696
  if g_param[OptionsDefine.Language]:
1604
1697
  profile.language = g_param[OptionsDefine.Language]
1605
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +1732,10 @@ def doDescribeIndex(args, parsed_globals):
1639
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1734
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1740
  else:
1645
1741
  cred = credential.Credential(
@@ -1651,7 +1747,7 @@ def doDescribeIndex(args, parsed_globals):
1651
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1749
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1751
  if g_param[OptionsDefine.Language]:
1656
1752
  profile.language = g_param[OptionsDefine.Language]
1657
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +1787,10 @@ def doModifyCloudProductLogCollection(args, parsed_globals):
1691
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1789
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1795
  else:
1697
1796
  cred = credential.Credential(
@@ -1703,7 +1802,7 @@ def doModifyCloudProductLogCollection(args, parsed_globals):
1703
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1704
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
1804
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
1806
  if g_param[OptionsDefine.Language]:
1708
1807
  profile.language = g_param[OptionsDefine.Language]
1709
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +1842,10 @@ def doCreateAlarmShield(args, parsed_globals):
1743
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
1844
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
1850
  else:
1749
1851
  cred = credential.Credential(
@@ -1755,7 +1857,7 @@ def doCreateAlarmShield(args, parsed_globals):
1755
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1756
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
1859
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
1861
  if g_param[OptionsDefine.Language]:
1760
1862
  profile.language = g_param[OptionsDefine.Language]
1761
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1785,6 +1887,61 @@ def doCreateAlarmShield(args, parsed_globals):
1785
1887
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1786
1888
 
1787
1889
 
1890
+ def doDeleteDlcDeliver(args, parsed_globals):
1891
+ g_param = parse_global_arg(parsed_globals)
1892
+
1893
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1894
+ cred = credential.CVMRoleCredential()
1895
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1896
+ cred = credential.STSAssumeRoleCredential(
1897
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1898
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1899
+ )
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1904
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1905
+ else:
1906
+ cred = credential.Credential(
1907
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1908
+ )
1909
+ http_profile = HttpProfile(
1910
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1911
+ reqMethod="POST",
1912
+ endpoint=g_param[OptionsDefine.Endpoint],
1913
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1914
+ )
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1916
+ if g_param[OptionsDefine.Language]:
1917
+ profile.language = g_param[OptionsDefine.Language]
1918
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1919
+ client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
1920
+ client._sdkVersion += ("_CLI_" + __version__)
1921
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1922
+ model = models.DeleteDlcDeliverRequest()
1923
+ model.from_json_string(json.dumps(args))
1924
+ start_time = time.time()
1925
+ while True:
1926
+ rsp = client.DeleteDlcDeliver(model)
1927
+ result = rsp.to_json_string()
1928
+ try:
1929
+ json_obj = json.loads(result)
1930
+ except TypeError as e:
1931
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1932
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1933
+ break
1934
+ cur_time = time.time()
1935
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1936
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1937
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1938
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1939
+ else:
1940
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1941
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1942
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1943
+
1944
+
1788
1945
  def doCreateShipper(args, parsed_globals):
1789
1946
  g_param = parse_global_arg(parsed_globals)
1790
1947
 
@@ -1795,7 +1952,10 @@ def doCreateShipper(args, parsed_globals):
1795
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
1954
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
1960
  else:
1801
1961
  cred = credential.Credential(
@@ -1807,7 +1967,7 @@ def doCreateShipper(args, parsed_globals):
1807
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1808
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
1969
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
1971
  if g_param[OptionsDefine.Language]:
1812
1972
  profile.language = g_param[OptionsDefine.Language]
1813
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1847,7 +2007,10 @@ def doCreateNoticeContent(args, parsed_globals):
1847
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2009
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2015
  else:
1853
2016
  cred = credential.Credential(
@@ -1859,7 +2022,7 @@ def doCreateNoticeContent(args, parsed_globals):
1859
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2024
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2026
  if g_param[OptionsDefine.Language]:
1864
2027
  profile.language = g_param[OptionsDefine.Language]
1865
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1899,7 +2062,10 @@ def doDeleteConsumer(args, parsed_globals):
1899
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2064
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2070
  else:
1905
2071
  cred = credential.Credential(
@@ -1911,7 +2077,7 @@ def doDeleteConsumer(args, parsed_globals):
1911
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2079
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2081
  if g_param[OptionsDefine.Language]:
1916
2082
  profile.language = g_param[OptionsDefine.Language]
1917
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1951,7 +2117,10 @@ def doDeleteMachineGroup(args, parsed_globals):
1951
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2119
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2125
  else:
1957
2126
  cred = credential.Credential(
@@ -1963,7 +2132,7 @@ def doDeleteMachineGroup(args, parsed_globals):
1963
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2134
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2136
  if g_param[OptionsDefine.Language]:
1968
2137
  profile.language = g_param[OptionsDefine.Language]
1969
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1993,6 +2162,61 @@ def doDeleteMachineGroup(args, parsed_globals):
1993
2162
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1994
2163
 
1995
2164
 
2165
+ def doDescribeConfigMachineGroups(args, parsed_globals):
2166
+ g_param = parse_global_arg(parsed_globals)
2167
+
2168
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2169
+ cred = credential.CVMRoleCredential()
2170
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2171
+ cred = credential.STSAssumeRoleCredential(
2172
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2173
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2174
+ )
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2179
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2180
+ else:
2181
+ cred = credential.Credential(
2182
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2183
+ )
2184
+ http_profile = HttpProfile(
2185
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2186
+ reqMethod="POST",
2187
+ endpoint=g_param[OptionsDefine.Endpoint],
2188
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2189
+ )
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2191
+ if g_param[OptionsDefine.Language]:
2192
+ profile.language = g_param[OptionsDefine.Language]
2193
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2194
+ client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
2195
+ client._sdkVersion += ("_CLI_" + __version__)
2196
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2197
+ model = models.DescribeConfigMachineGroupsRequest()
2198
+ model.from_json_string(json.dumps(args))
2199
+ start_time = time.time()
2200
+ while True:
2201
+ rsp = client.DescribeConfigMachineGroups(model)
2202
+ result = rsp.to_json_string()
2203
+ try:
2204
+ json_obj = json.loads(result)
2205
+ except TypeError as e:
2206
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2207
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2208
+ break
2209
+ cur_time = time.time()
2210
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2211
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2212
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2213
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2214
+ else:
2215
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2216
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2217
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2218
+
2219
+
1996
2220
  def doDeleteCosRecharge(args, parsed_globals):
1997
2221
  g_param = parse_global_arg(parsed_globals)
1998
2222
 
@@ -2003,7 +2227,10 @@ def doDeleteCosRecharge(args, parsed_globals):
2003
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2229
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2235
  else:
2009
2236
  cred = credential.Credential(
@@ -2015,7 +2242,7 @@ def doDeleteCosRecharge(args, parsed_globals):
2015
2242
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2244
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2246
  if g_param[OptionsDefine.Language]:
2020
2247
  profile.language = g_param[OptionsDefine.Language]
2021
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2055,7 +2282,10 @@ def doDescribeKafkaConsumerGroupList(args, parsed_globals):
2055
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2284
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2290
  else:
2061
2291
  cred = credential.Credential(
@@ -2067,7 +2297,7 @@ def doDescribeKafkaConsumerGroupList(args, parsed_globals):
2067
2297
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2299
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2301
  if g_param[OptionsDefine.Language]:
2072
2302
  profile.language = g_param[OptionsDefine.Language]
2073
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2107,7 +2337,10 @@ def doDescribeKafkaRecharges(args, parsed_globals):
2107
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2339
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2345
  else:
2113
2346
  cred = credential.Credential(
@@ -2119,7 +2352,7 @@ def doDescribeKafkaRecharges(args, parsed_globals):
2119
2352
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2354
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2356
  if g_param[OptionsDefine.Language]:
2124
2357
  profile.language = g_param[OptionsDefine.Language]
2125
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2159,7 +2392,10 @@ def doDescribeAlarms(args, parsed_globals):
2159
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2394
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2400
  else:
2165
2401
  cred = credential.Credential(
@@ -2171,7 +2407,7 @@ def doDescribeAlarms(args, parsed_globals):
2171
2407
  endpoint=g_param[OptionsDefine.Endpoint],
2172
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
2409
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
2411
  if g_param[OptionsDefine.Language]:
2176
2412
  profile.language = g_param[OptionsDefine.Language]
2177
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2211,7 +2447,10 @@ def doDescribeCosRecharges(args, parsed_globals):
2211
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2449
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2455
  else:
2217
2456
  cred = credential.Credential(
@@ -2223,7 +2462,7 @@ def doDescribeCosRecharges(args, parsed_globals):
2223
2462
  endpoint=g_param[OptionsDefine.Endpoint],
2224
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
2464
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
2466
  if g_param[OptionsDefine.Language]:
2228
2467
  profile.language = g_param[OptionsDefine.Language]
2229
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2263,7 +2502,10 @@ def doApplyConfigToMachineGroup(args, parsed_globals):
2263
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
2504
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
2510
  else:
2269
2511
  cred = credential.Credential(
@@ -2275,7 +2517,7 @@ def doApplyConfigToMachineGroup(args, parsed_globals):
2275
2517
  endpoint=g_param[OptionsDefine.Endpoint],
2276
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
2519
  )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2279
2521
  if g_param[OptionsDefine.Language]:
2280
2522
  profile.language = g_param[OptionsDefine.Language]
2281
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2315,7 +2557,10 @@ def doDeleteAlarmShield(args, parsed_globals):
2315
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
2559
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
2565
  else:
2321
2566
  cred = credential.Credential(
@@ -2327,7 +2572,7 @@ def doDeleteAlarmShield(args, parsed_globals):
2327
2572
  endpoint=g_param[OptionsDefine.Endpoint],
2328
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
2574
  )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2331
2576
  if g_param[OptionsDefine.Language]:
2332
2577
  profile.language = g_param[OptionsDefine.Language]
2333
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2367,7 +2612,10 @@ def doDescribeLogHistogram(args, parsed_globals):
2367
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
2614
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
2620
  else:
2373
2621
  cred = credential.Credential(
@@ -2379,7 +2627,7 @@ def doDescribeLogHistogram(args, parsed_globals):
2379
2627
  endpoint=g_param[OptionsDefine.Endpoint],
2380
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
2629
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
2631
  if g_param[OptionsDefine.Language]:
2384
2632
  profile.language = g_param[OptionsDefine.Language]
2385
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2419,7 +2667,10 @@ def doDeleteScheduledSql(args, parsed_globals):
2419
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
2669
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
2675
  else:
2425
2676
  cred = credential.Credential(
@@ -2431,7 +2682,7 @@ def doDeleteScheduledSql(args, parsed_globals):
2431
2682
  endpoint=g_param[OptionsDefine.Endpoint],
2432
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
2684
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
2686
  if g_param[OptionsDefine.Language]:
2436
2687
  profile.language = g_param[OptionsDefine.Language]
2437
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2471,7 +2722,10 @@ def doOpenKafkaConsumer(args, parsed_globals):
2471
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
2724
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
2730
  else:
2477
2731
  cred = credential.Credential(
@@ -2483,7 +2737,7 @@ def doOpenKafkaConsumer(args, parsed_globals):
2483
2737
  endpoint=g_param[OptionsDefine.Endpoint],
2484
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
2739
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
2741
  if g_param[OptionsDefine.Language]:
2488
2742
  profile.language = g_param[OptionsDefine.Language]
2489
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2523,7 +2777,10 @@ def doCreateDashboardSubscribe(args, parsed_globals):
2523
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
2779
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
2785
  else:
2529
2786
  cred = credential.Credential(
@@ -2535,7 +2792,7 @@ def doCreateDashboardSubscribe(args, parsed_globals):
2535
2792
  endpoint=g_param[OptionsDefine.Endpoint],
2536
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
2794
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
2796
  if g_param[OptionsDefine.Language]:
2540
2797
  profile.language = g_param[OptionsDefine.Language]
2541
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2565,6 +2822,61 @@ def doCreateDashboardSubscribe(args, parsed_globals):
2565
2822
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2566
2823
 
2567
2824
 
2825
+ def doModifyShipper(args, parsed_globals):
2826
+ g_param = parse_global_arg(parsed_globals)
2827
+
2828
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2829
+ cred = credential.CVMRoleCredential()
2830
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2831
+ cred = credential.STSAssumeRoleCredential(
2832
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2833
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2834
+ )
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
+ else:
2841
+ cred = credential.Credential(
2842
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2843
+ )
2844
+ http_profile = HttpProfile(
2845
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2846
+ reqMethod="POST",
2847
+ endpoint=g_param[OptionsDefine.Endpoint],
2848
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2849
+ )
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2851
+ if g_param[OptionsDefine.Language]:
2852
+ profile.language = g_param[OptionsDefine.Language]
2853
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2854
+ client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
2855
+ client._sdkVersion += ("_CLI_" + __version__)
2856
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2857
+ model = models.ModifyShipperRequest()
2858
+ model.from_json_string(json.dumps(args))
2859
+ start_time = time.time()
2860
+ while True:
2861
+ rsp = client.ModifyShipper(model)
2862
+ result = rsp.to_json_string()
2863
+ try:
2864
+ json_obj = json.loads(result)
2865
+ except TypeError as e:
2866
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2867
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2868
+ break
2869
+ cur_time = time.time()
2870
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2871
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2872
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2873
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2874
+ else:
2875
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2876
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2877
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2878
+
2879
+
2568
2880
  def doModifyDashboardSubscribe(args, parsed_globals):
2569
2881
  g_param = parse_global_arg(parsed_globals)
2570
2882
 
@@ -2575,7 +2887,10 @@ def doModifyDashboardSubscribe(args, parsed_globals):
2575
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
2889
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
2895
  else:
2581
2896
  cred = credential.Credential(
@@ -2587,7 +2902,7 @@ def doModifyDashboardSubscribe(args, parsed_globals):
2587
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2588
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
2904
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
2906
  if g_param[OptionsDefine.Language]:
2592
2907
  profile.language = g_param[OptionsDefine.Language]
2593
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2627,7 +2942,10 @@ def doDeleteIndex(args, parsed_globals):
2627
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
2944
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
2950
  else:
2633
2951
  cred = credential.Credential(
@@ -2639,7 +2957,7 @@ def doDeleteIndex(args, parsed_globals):
2639
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2640
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
2959
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
2961
  if g_param[OptionsDefine.Language]:
2644
2962
  profile.language = g_param[OptionsDefine.Language]
2645
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2679,7 +2997,10 @@ def doDeleteWebCallback(args, parsed_globals):
2679
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
2999
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
3005
  else:
2685
3006
  cred = credential.Credential(
@@ -2691,7 +3012,7 @@ def doDeleteWebCallback(args, parsed_globals):
2691
3012
  endpoint=g_param[OptionsDefine.Endpoint],
2692
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
3014
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
3016
  if g_param[OptionsDefine.Language]:
2696
3017
  profile.language = g_param[OptionsDefine.Language]
2697
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2731,7 +3052,10 @@ def doModifyCosRecharge(args, parsed_globals):
2731
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
3054
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
3060
  else:
2737
3061
  cred = credential.Credential(
@@ -2743,7 +3067,7 @@ def doModifyCosRecharge(args, parsed_globals):
2743
3067
  endpoint=g_param[OptionsDefine.Endpoint],
2744
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
3069
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
3071
  if g_param[OptionsDefine.Language]:
2748
3072
  profile.language = g_param[OptionsDefine.Language]
2749
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2783,7 +3107,10 @@ def doModifyConfigExtra(args, parsed_globals):
2783
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
3109
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
3115
  else:
2789
3116
  cred = credential.Credential(
@@ -2795,7 +3122,7 @@ def doModifyConfigExtra(args, parsed_globals):
2795
3122
  endpoint=g_param[OptionsDefine.Endpoint],
2796
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
3124
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
3126
  if g_param[OptionsDefine.Language]:
2800
3127
  profile.language = g_param[OptionsDefine.Language]
2801
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2835,7 +3162,10 @@ def doModifyAlarmShield(args, parsed_globals):
2835
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2836
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2837
3164
  )
2838
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
3170
  else:
2841
3171
  cred = credential.Credential(
@@ -2847,7 +3177,7 @@ def doModifyAlarmShield(args, parsed_globals):
2847
3177
  endpoint=g_param[OptionsDefine.Endpoint],
2848
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2849
3179
  )
2850
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2851
3181
  if g_param[OptionsDefine.Language]:
2852
3182
  profile.language = g_param[OptionsDefine.Language]
2853
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2887,7 +3217,10 @@ def doSearchDashboardSubscribe(args, parsed_globals):
2887
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2888
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2889
3219
  )
2890
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2891
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2892
3225
  else:
2893
3226
  cred = credential.Credential(
@@ -2899,7 +3232,7 @@ def doSearchDashboardSubscribe(args, parsed_globals):
2899
3232
  endpoint=g_param[OptionsDefine.Endpoint],
2900
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2901
3234
  )
2902
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2903
3236
  if g_param[OptionsDefine.Language]:
2904
3237
  profile.language = g_param[OptionsDefine.Language]
2905
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2939,7 +3272,10 @@ def doCreateConfigExtra(args, parsed_globals):
2939
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2940
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2941
3274
  )
2942
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2943
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2944
3280
  else:
2945
3281
  cred = credential.Credential(
@@ -2951,7 +3287,7 @@ def doCreateConfigExtra(args, parsed_globals):
2951
3287
  endpoint=g_param[OptionsDefine.Endpoint],
2952
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2953
3289
  )
2954
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2955
3291
  if g_param[OptionsDefine.Language]:
2956
3292
  profile.language = g_param[OptionsDefine.Language]
2957
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2991,7 +3327,10 @@ def doDescribeAlarmShields(args, parsed_globals):
2991
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2992
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2993
3329
  )
2994
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2995
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2996
3335
  else:
2997
3336
  cred = credential.Credential(
@@ -3003,7 +3342,7 @@ def doDescribeAlarmShields(args, parsed_globals):
3003
3342
  endpoint=g_param[OptionsDefine.Endpoint],
3004
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3005
3344
  )
3006
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3007
3346
  if g_param[OptionsDefine.Language]:
3008
3347
  profile.language = g_param[OptionsDefine.Language]
3009
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3043,7 +3382,10 @@ def doModifyScheduledSql(args, parsed_globals):
3043
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3044
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3045
3384
  )
3046
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3047
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3048
3390
  else:
3049
3391
  cred = credential.Credential(
@@ -3055,7 +3397,7 @@ def doModifyScheduledSql(args, parsed_globals):
3055
3397
  endpoint=g_param[OptionsDefine.Endpoint],
3056
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3057
3399
  )
3058
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3059
3401
  if g_param[OptionsDefine.Language]:
3060
3402
  profile.language = g_param[OptionsDefine.Language]
3061
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3095,7 +3437,10 @@ def doCreateMachineGroup(args, parsed_globals):
3095
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
3439
  )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
3445
  else:
3101
3446
  cred = credential.Credential(
@@ -3107,7 +3452,7 @@ def doCreateMachineGroup(args, parsed_globals):
3107
3452
  endpoint=g_param[OptionsDefine.Endpoint],
3108
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3109
3454
  )
3110
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3111
3456
  if g_param[OptionsDefine.Language]:
3112
3457
  profile.language = g_param[OptionsDefine.Language]
3113
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3147,7 +3492,10 @@ def doDeleteMachineGroupInfo(args, parsed_globals):
3147
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3148
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3149
3494
  )
3150
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3151
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3152
3500
  else:
3153
3501
  cred = credential.Credential(
@@ -3159,7 +3507,7 @@ def doDeleteMachineGroupInfo(args, parsed_globals):
3159
3507
  endpoint=g_param[OptionsDefine.Endpoint],
3160
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3161
3509
  )
3162
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3163
3511
  if g_param[OptionsDefine.Language]:
3164
3512
  profile.language = g_param[OptionsDefine.Language]
3165
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3199,7 +3547,10 @@ def doGetAlarmLog(args, parsed_globals):
3199
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3200
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3201
3549
  )
3202
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3203
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3204
3555
  else:
3205
3556
  cred = credential.Credential(
@@ -3211,7 +3562,7 @@ def doGetAlarmLog(args, parsed_globals):
3211
3562
  endpoint=g_param[OptionsDefine.Endpoint],
3212
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3213
3564
  )
3214
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3215
3566
  if g_param[OptionsDefine.Language]:
3216
3567
  profile.language = g_param[OptionsDefine.Language]
3217
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3251,7 +3602,10 @@ def doCreateConsoleSharing(args, parsed_globals):
3251
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
3604
  )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
3610
  else:
3257
3611
  cred = credential.Credential(
@@ -3263,7 +3617,7 @@ def doCreateConsoleSharing(args, parsed_globals):
3263
3617
  endpoint=g_param[OptionsDefine.Endpoint],
3264
3618
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3265
3619
  )
3266
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3620
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3267
3621
  if g_param[OptionsDefine.Language]:
3268
3622
  profile.language = g_param[OptionsDefine.Language]
3269
3623
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3303,7 +3657,10 @@ def doDescribeMachineGroupConfigs(args, parsed_globals):
3303
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3304
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3305
3659
  )
3306
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3307
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3308
3665
  else:
3309
3666
  cred = credential.Credential(
@@ -3315,7 +3672,7 @@ def doDescribeMachineGroupConfigs(args, parsed_globals):
3315
3672
  endpoint=g_param[OptionsDefine.Endpoint],
3316
3673
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3317
3674
  )
3318
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3675
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3319
3676
  if g_param[OptionsDefine.Language]:
3320
3677
  profile.language = g_param[OptionsDefine.Language]
3321
3678
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3355,7 +3712,10 @@ def doDescribeShipperTasks(args, parsed_globals):
3355
3712
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3356
3713
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3357
3714
  )
3358
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3715
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3716
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3717
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3359
3719
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3360
3720
  else:
3361
3721
  cred = credential.Credential(
@@ -3367,7 +3727,7 @@ def doDescribeShipperTasks(args, parsed_globals):
3367
3727
  endpoint=g_param[OptionsDefine.Endpoint],
3368
3728
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3369
3729
  )
3370
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3730
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3371
3731
  if g_param[OptionsDefine.Language]:
3372
3732
  profile.language = g_param[OptionsDefine.Language]
3373
3733
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3407,7 +3767,10 @@ def doModifyNoticeContent(args, parsed_globals):
3407
3767
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3408
3768
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3409
3769
  )
3410
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3770
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3771
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3772
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3411
3774
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3412
3775
  else:
3413
3776
  cred = credential.Credential(
@@ -3419,7 +3782,7 @@ def doModifyNoticeContent(args, parsed_globals):
3419
3782
  endpoint=g_param[OptionsDefine.Endpoint],
3420
3783
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3421
3784
  )
3422
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3785
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3423
3786
  if g_param[OptionsDefine.Language]:
3424
3787
  profile.language = g_param[OptionsDefine.Language]
3425
3788
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3459,7 +3822,10 @@ def doSearchCosRechargeInfo(args, parsed_globals):
3459
3822
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3460
3823
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3461
3824
  )
3462
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3825
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3826
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3827
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3463
3829
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3464
3830
  else:
3465
3831
  cred = credential.Credential(
@@ -3471,7 +3837,7 @@ def doSearchCosRechargeInfo(args, parsed_globals):
3471
3837
  endpoint=g_param[OptionsDefine.Endpoint],
3472
3838
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3473
3839
  )
3474
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3840
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3475
3841
  if g_param[OptionsDefine.Language]:
3476
3842
  profile.language = g_param[OptionsDefine.Language]
3477
3843
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3511,7 +3877,10 @@ def doModifyKafkaRecharge(args, parsed_globals):
3511
3877
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3512
3878
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3513
3879
  )
3514
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3880
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3881
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3882
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3515
3884
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3516
3885
  else:
3517
3886
  cred = credential.Credential(
@@ -3523,7 +3892,7 @@ def doModifyKafkaRecharge(args, parsed_globals):
3523
3892
  endpoint=g_param[OptionsDefine.Endpoint],
3524
3893
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3525
3894
  )
3526
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3895
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3527
3896
  if g_param[OptionsDefine.Language]:
3528
3897
  profile.language = g_param[OptionsDefine.Language]
3529
3898
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3563,7 +3932,10 @@ def doDescribeWebCallbacks(args, parsed_globals):
3563
3932
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3564
3933
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3565
3934
  )
3566
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3935
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3936
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3937
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3567
3939
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3568
3940
  else:
3569
3941
  cred = credential.Credential(
@@ -3575,7 +3947,7 @@ def doDescribeWebCallbacks(args, parsed_globals):
3575
3947
  endpoint=g_param[OptionsDefine.Endpoint],
3576
3948
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3577
3949
  )
3578
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3950
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3579
3951
  if g_param[OptionsDefine.Language]:
3580
3952
  profile.language = g_param[OptionsDefine.Language]
3581
3953
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3615,7 +3987,10 @@ def doDescribeKafkaConsumer(args, parsed_globals):
3615
3987
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3616
3988
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3617
3989
  )
3618
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3990
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3991
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3992
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3619
3994
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3620
3995
  else:
3621
3996
  cred = credential.Credential(
@@ -3627,7 +4002,7 @@ def doDescribeKafkaConsumer(args, parsed_globals):
3627
4002
  endpoint=g_param[OptionsDefine.Endpoint],
3628
4003
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3629
4004
  )
3630
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4005
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3631
4006
  if g_param[OptionsDefine.Language]:
3632
4007
  profile.language = g_param[OptionsDefine.Language]
3633
4008
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3667,7 +4042,10 @@ def doDeleteDashboardSubscribe(args, parsed_globals):
3667
4042
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
4043
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
4044
  )
3670
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4045
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4046
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4047
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
4049
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
4050
  else:
3673
4051
  cred = credential.Credential(
@@ -3679,7 +4057,7 @@ def doDeleteDashboardSubscribe(args, parsed_globals):
3679
4057
  endpoint=g_param[OptionsDefine.Endpoint],
3680
4058
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3681
4059
  )
3682
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4060
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3683
4061
  if g_param[OptionsDefine.Language]:
3684
4062
  profile.language = g_param[OptionsDefine.Language]
3685
4063
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3719,7 +4097,10 @@ def doCreateDataTransform(args, parsed_globals):
3719
4097
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3720
4098
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3721
4099
  )
3722
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4100
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4101
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4102
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3723
4104
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3724
4105
  else:
3725
4106
  cred = credential.Credential(
@@ -3731,7 +4112,7 @@ def doCreateDataTransform(args, parsed_globals):
3731
4112
  endpoint=g_param[OptionsDefine.Endpoint],
3732
4113
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3733
4114
  )
3734
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4115
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3735
4116
  if g_param[OptionsDefine.Language]:
3736
4117
  profile.language = g_param[OptionsDefine.Language]
3737
4118
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3771,7 +4152,10 @@ def doAddMachineGroupInfo(args, parsed_globals):
3771
4152
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3772
4153
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3773
4154
  )
3774
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4155
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4156
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4157
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3775
4159
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3776
4160
  else:
3777
4161
  cred = credential.Credential(
@@ -3783,7 +4167,7 @@ def doAddMachineGroupInfo(args, parsed_globals):
3783
4167
  endpoint=g_param[OptionsDefine.Endpoint],
3784
4168
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3785
4169
  )
3786
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4170
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3787
4171
  if g_param[OptionsDefine.Language]:
3788
4172
  profile.language = g_param[OptionsDefine.Language]
3789
4173
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3823,7 +4207,10 @@ def doDeleteNoticeContent(args, parsed_globals):
3823
4207
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
4208
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
4209
  )
3826
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4210
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4211
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4212
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
4214
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
4215
  else:
3829
4216
  cred = credential.Credential(
@@ -3835,7 +4222,7 @@ def doDeleteNoticeContent(args, parsed_globals):
3835
4222
  endpoint=g_param[OptionsDefine.Endpoint],
3836
4223
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
4224
  )
3838
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4225
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3839
4226
  if g_param[OptionsDefine.Language]:
3840
4227
  profile.language = g_param[OptionsDefine.Language]
3841
4228
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3865,7 +4252,7 @@ def doDeleteNoticeContent(args, parsed_globals):
3865
4252
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
4253
 
3867
4254
 
3868
- def doDeleteConsoleSharing(args, parsed_globals):
4255
+ def doDescribeDataTransformInfo(args, parsed_globals):
3869
4256
  g_param = parse_global_arg(parsed_globals)
3870
4257
 
3871
4258
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3875,7 +4262,10 @@ def doDeleteConsoleSharing(args, parsed_globals):
3875
4262
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3876
4263
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3877
4264
  )
3878
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4265
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4266
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4267
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3879
4269
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3880
4270
  else:
3881
4271
  cred = credential.Credential(
@@ -3887,18 +4277,18 @@ def doDeleteConsoleSharing(args, parsed_globals):
3887
4277
  endpoint=g_param[OptionsDefine.Endpoint],
3888
4278
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3889
4279
  )
3890
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4280
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3891
4281
  if g_param[OptionsDefine.Language]:
3892
4282
  profile.language = g_param[OptionsDefine.Language]
3893
4283
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3894
4284
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
3895
4285
  client._sdkVersion += ("_CLI_" + __version__)
3896
4286
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3897
- model = models.DeleteConsoleSharingRequest()
4287
+ model = models.DescribeDataTransformInfoRequest()
3898
4288
  model.from_json_string(json.dumps(args))
3899
4289
  start_time = time.time()
3900
4290
  while True:
3901
- rsp = client.DeleteConsoleSharing(model)
4291
+ rsp = client.DescribeDataTransformInfo(model)
3902
4292
  result = rsp.to_json_string()
3903
4293
  try:
3904
4294
  json_obj = json.loads(result)
@@ -3927,7 +4317,10 @@ def doDescribeAlarmNotices(args, parsed_globals):
3927
4317
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3928
4318
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3929
4319
  )
3930
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4320
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4321
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4322
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3931
4324
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3932
4325
  else:
3933
4326
  cred = credential.Credential(
@@ -3939,7 +4332,7 @@ def doDescribeAlarmNotices(args, parsed_globals):
3939
4332
  endpoint=g_param[OptionsDefine.Endpoint],
3940
4333
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3941
4334
  )
3942
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4335
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3943
4336
  if g_param[OptionsDefine.Language]:
3944
4337
  profile.language = g_param[OptionsDefine.Language]
3945
4338
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3979,7 +4372,10 @@ def doDescribePartitions(args, parsed_globals):
3979
4372
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3980
4373
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3981
4374
  )
3982
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4375
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4376
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4377
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3983
4379
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3984
4380
  else:
3985
4381
  cred = credential.Credential(
@@ -3991,7 +4387,7 @@ def doDescribePartitions(args, parsed_globals):
3991
4387
  endpoint=g_param[OptionsDefine.Endpoint],
3992
4388
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3993
4389
  )
3994
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4390
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3995
4391
  if g_param[OptionsDefine.Language]:
3996
4392
  profile.language = g_param[OptionsDefine.Language]
3997
4393
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4031,7 +4427,10 @@ def doCreateLogset(args, parsed_globals):
4031
4427
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4032
4428
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4033
4429
  )
4034
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4430
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4431
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4432
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4433
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4035
4434
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4036
4435
  else:
4037
4436
  cred = credential.Credential(
@@ -4043,7 +4442,7 @@ def doCreateLogset(args, parsed_globals):
4043
4442
  endpoint=g_param[OptionsDefine.Endpoint],
4044
4443
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4045
4444
  )
4046
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4445
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4047
4446
  if g_param[OptionsDefine.Language]:
4048
4447
  profile.language = g_param[OptionsDefine.Language]
4049
4448
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4083,7 +4482,10 @@ def doCheckFunction(args, parsed_globals):
4083
4482
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4084
4483
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4085
4484
  )
4086
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4485
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4486
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4487
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4488
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4087
4489
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4088
4490
  else:
4089
4491
  cred = credential.Credential(
@@ -4095,7 +4497,7 @@ def doCheckFunction(args, parsed_globals):
4095
4497
  endpoint=g_param[OptionsDefine.Endpoint],
4096
4498
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4097
4499
  )
4098
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4500
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4099
4501
  if g_param[OptionsDefine.Language]:
4100
4502
  profile.language = g_param[OptionsDefine.Language]
4101
4503
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4135,7 +4537,10 @@ def doDeleteAlarm(args, parsed_globals):
4135
4537
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4136
4538
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4137
4539
  )
4138
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4540
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4541
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4542
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4543
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4139
4544
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4140
4545
  else:
4141
4546
  cred = credential.Credential(
@@ -4147,7 +4552,7 @@ def doDeleteAlarm(args, parsed_globals):
4147
4552
  endpoint=g_param[OptionsDefine.Endpoint],
4148
4553
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4149
4554
  )
4150
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4555
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4151
4556
  if g_param[OptionsDefine.Language]:
4152
4557
  profile.language = g_param[OptionsDefine.Language]
4153
4558
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4187,7 +4592,10 @@ def doDeleteShipper(args, parsed_globals):
4187
4592
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4188
4593
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4189
4594
  )
4190
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4595
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4596
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4597
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4598
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4191
4599
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4192
4600
  else:
4193
4601
  cred = credential.Credential(
@@ -4199,7 +4607,7 @@ def doDeleteShipper(args, parsed_globals):
4199
4607
  endpoint=g_param[OptionsDefine.Endpoint],
4200
4608
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4201
4609
  )
4202
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4610
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4203
4611
  if g_param[OptionsDefine.Language]:
4204
4612
  profile.language = g_param[OptionsDefine.Language]
4205
4613
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4229,6 +4637,61 @@ def doDeleteShipper(args, parsed_globals):
4229
4637
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4230
4638
 
4231
4639
 
4640
+ def doDescribeDlcDelivers(args, parsed_globals):
4641
+ g_param = parse_global_arg(parsed_globals)
4642
+
4643
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4644
+ cred = credential.CVMRoleCredential()
4645
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4646
+ cred = credential.STSAssumeRoleCredential(
4647
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4648
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4649
+ )
4650
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4651
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4652
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4653
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4654
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4655
+ else:
4656
+ cred = credential.Credential(
4657
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4658
+ )
4659
+ http_profile = HttpProfile(
4660
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4661
+ reqMethod="POST",
4662
+ endpoint=g_param[OptionsDefine.Endpoint],
4663
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4664
+ )
4665
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4666
+ if g_param[OptionsDefine.Language]:
4667
+ profile.language = g_param[OptionsDefine.Language]
4668
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4669
+ client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
4670
+ client._sdkVersion += ("_CLI_" + __version__)
4671
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4672
+ model = models.DescribeDlcDeliversRequest()
4673
+ model.from_json_string(json.dumps(args))
4674
+ start_time = time.time()
4675
+ while True:
4676
+ rsp = client.DescribeDlcDelivers(model)
4677
+ result = rsp.to_json_string()
4678
+ try:
4679
+ json_obj = json.loads(result)
4680
+ except TypeError as e:
4681
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4682
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4683
+ break
4684
+ cur_time = time.time()
4685
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4686
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4687
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4688
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4689
+ else:
4690
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4691
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4692
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4693
+
4694
+
4232
4695
  def doQueryRangeMetric(args, parsed_globals):
4233
4696
  g_param = parse_global_arg(parsed_globals)
4234
4697
 
@@ -4239,7 +4702,10 @@ def doQueryRangeMetric(args, parsed_globals):
4239
4702
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4240
4703
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4241
4704
  )
4242
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4705
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4706
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4707
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4708
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4243
4709
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4244
4710
  else:
4245
4711
  cred = credential.Credential(
@@ -4251,7 +4717,7 @@ def doQueryRangeMetric(args, parsed_globals):
4251
4717
  endpoint=g_param[OptionsDefine.Endpoint],
4252
4718
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4253
4719
  )
4254
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4720
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4255
4721
  if g_param[OptionsDefine.Language]:
4256
4722
  profile.language = g_param[OptionsDefine.Language]
4257
4723
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4281,7 +4747,7 @@ def doQueryRangeMetric(args, parsed_globals):
4281
4747
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4282
4748
 
4283
4749
 
4284
- def doDescribeConfigMachineGroups(args, parsed_globals):
4750
+ def doCreateAlarmNotice(args, parsed_globals):
4285
4751
  g_param = parse_global_arg(parsed_globals)
4286
4752
 
4287
4753
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4291,7 +4757,10 @@ def doDescribeConfigMachineGroups(args, parsed_globals):
4291
4757
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4292
4758
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4293
4759
  )
4294
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4760
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4761
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4762
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4763
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4295
4764
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4296
4765
  else:
4297
4766
  cred = credential.Credential(
@@ -4303,18 +4772,18 @@ def doDescribeConfigMachineGroups(args, parsed_globals):
4303
4772
  endpoint=g_param[OptionsDefine.Endpoint],
4304
4773
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4305
4774
  )
4306
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4775
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4307
4776
  if g_param[OptionsDefine.Language]:
4308
4777
  profile.language = g_param[OptionsDefine.Language]
4309
4778
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4310
4779
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
4311
4780
  client._sdkVersion += ("_CLI_" + __version__)
4312
4781
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4313
- model = models.DescribeConfigMachineGroupsRequest()
4782
+ model = models.CreateAlarmNoticeRequest()
4314
4783
  model.from_json_string(json.dumps(args))
4315
4784
  start_time = time.time()
4316
4785
  while True:
4317
- rsp = client.DescribeConfigMachineGroups(model)
4786
+ rsp = client.CreateAlarmNotice(model)
4318
4787
  result = rsp.to_json_string()
4319
4788
  try:
4320
4789
  json_obj = json.loads(result)
@@ -4343,7 +4812,10 @@ def doDeleteExport(args, parsed_globals):
4343
4812
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4344
4813
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4345
4814
  )
4346
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4816
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4817
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4818
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4347
4819
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4348
4820
  else:
4349
4821
  cred = credential.Credential(
@@ -4355,7 +4827,7 @@ def doDeleteExport(args, parsed_globals):
4355
4827
  endpoint=g_param[OptionsDefine.Endpoint],
4356
4828
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4357
4829
  )
4358
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4830
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4359
4831
  if g_param[OptionsDefine.Language]:
4360
4832
  profile.language = g_param[OptionsDefine.Language]
4361
4833
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4395,7 +4867,10 @@ def doSplitPartition(args, parsed_globals):
4395
4867
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4396
4868
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4397
4869
  )
4398
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4870
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4871
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4872
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4873
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4399
4874
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4400
4875
  else:
4401
4876
  cred = credential.Credential(
@@ -4407,7 +4882,7 @@ def doSplitPartition(args, parsed_globals):
4407
4882
  endpoint=g_param[OptionsDefine.Endpoint],
4408
4883
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4409
4884
  )
4410
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4885
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4411
4886
  if g_param[OptionsDefine.Language]:
4412
4887
  profile.language = g_param[OptionsDefine.Language]
4413
4888
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4437,7 +4912,7 @@ def doSplitPartition(args, parsed_globals):
4437
4912
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4438
4913
 
4439
4914
 
4440
- def doDescribeDataTransformInfo(args, parsed_globals):
4915
+ def doDeleteConsoleSharing(args, parsed_globals):
4441
4916
  g_param = parse_global_arg(parsed_globals)
4442
4917
 
4443
4918
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4447,7 +4922,10 @@ def doDescribeDataTransformInfo(args, parsed_globals):
4447
4922
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4448
4923
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4449
4924
  )
4450
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4925
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4926
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4927
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4928
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4451
4929
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4452
4930
  else:
4453
4931
  cred = credential.Credential(
@@ -4459,18 +4937,18 @@ def doDescribeDataTransformInfo(args, parsed_globals):
4459
4937
  endpoint=g_param[OptionsDefine.Endpoint],
4460
4938
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4461
4939
  )
4462
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4940
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4463
4941
  if g_param[OptionsDefine.Language]:
4464
4942
  profile.language = g_param[OptionsDefine.Language]
4465
4943
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4466
4944
  client = mod.ClsClient(cred, g_param[OptionsDefine.Region], profile)
4467
4945
  client._sdkVersion += ("_CLI_" + __version__)
4468
4946
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4469
- model = models.DescribeDataTransformInfoRequest()
4947
+ model = models.DeleteConsoleSharingRequest()
4470
4948
  model.from_json_string(json.dumps(args))
4471
4949
  start_time = time.time()
4472
4950
  while True:
4473
- rsp = client.DescribeDataTransformInfo(model)
4951
+ rsp = client.DeleteConsoleSharing(model)
4474
4952
  result = rsp.to_json_string()
4475
4953
  try:
4476
4954
  json_obj = json.loads(result)
@@ -4499,7 +4977,10 @@ def doDescribeMachineGroups(args, parsed_globals):
4499
4977
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4500
4978
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4501
4979
  )
4502
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4980
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4981
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4982
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4983
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4503
4984
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4504
4985
  else:
4505
4986
  cred = credential.Credential(
@@ -4511,7 +4992,7 @@ def doDescribeMachineGroups(args, parsed_globals):
4511
4992
  endpoint=g_param[OptionsDefine.Endpoint],
4512
4993
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4513
4994
  )
4514
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4995
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4515
4996
  if g_param[OptionsDefine.Language]:
4516
4997
  profile.language = g_param[OptionsDefine.Language]
4517
4998
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4551,7 +5032,10 @@ def doCreateConsumer(args, parsed_globals):
4551
5032
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4552
5033
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4553
5034
  )
4554
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5035
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5036
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5037
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5038
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4555
5039
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4556
5040
  else:
4557
5041
  cred = credential.Credential(
@@ -4563,7 +5047,7 @@ def doCreateConsumer(args, parsed_globals):
4563
5047
  endpoint=g_param[OptionsDefine.Endpoint],
4564
5048
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4565
5049
  )
4566
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5050
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4567
5051
  if g_param[OptionsDefine.Language]:
4568
5052
  profile.language = g_param[OptionsDefine.Language]
4569
5053
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4603,7 +5087,10 @@ def doModifyTopic(args, parsed_globals):
4603
5087
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4604
5088
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4605
5089
  )
4606
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5090
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5091
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5092
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5093
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4607
5094
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4608
5095
  else:
4609
5096
  cred = credential.Credential(
@@ -4615,7 +5102,7 @@ def doModifyTopic(args, parsed_globals):
4615
5102
  endpoint=g_param[OptionsDefine.Endpoint],
4616
5103
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4617
5104
  )
4618
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5105
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4619
5106
  if g_param[OptionsDefine.Language]:
4620
5107
  profile.language = g_param[OptionsDefine.Language]
4621
5108
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4655,7 +5142,10 @@ def doDescribeDashboardSubscribes(args, parsed_globals):
4655
5142
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4656
5143
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4657
5144
  )
4658
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5145
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5146
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5147
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5148
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4659
5149
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4660
5150
  else:
4661
5151
  cred = credential.Credential(
@@ -4667,7 +5157,7 @@ def doDescribeDashboardSubscribes(args, parsed_globals):
4667
5157
  endpoint=g_param[OptionsDefine.Endpoint],
4668
5158
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4669
5159
  )
4670
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5160
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4671
5161
  if g_param[OptionsDefine.Language]:
4672
5162
  profile.language = g_param[OptionsDefine.Language]
4673
5163
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4707,7 +5197,10 @@ def doModifyWebCallback(args, parsed_globals):
4707
5197
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4708
5198
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4709
5199
  )
4710
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5200
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5201
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5202
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5203
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4711
5204
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4712
5205
  else:
4713
5206
  cred = credential.Credential(
@@ -4719,7 +5212,7 @@ def doModifyWebCallback(args, parsed_globals):
4719
5212
  endpoint=g_param[OptionsDefine.Endpoint],
4720
5213
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4721
5214
  )
4722
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5215
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4723
5216
  if g_param[OptionsDefine.Language]:
4724
5217
  profile.language = g_param[OptionsDefine.Language]
4725
5218
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4759,7 +5252,10 @@ def doModifyMachineGroup(args, parsed_globals):
4759
5252
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4760
5253
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4761
5254
  )
4762
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5255
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5256
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5257
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5258
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4763
5259
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4764
5260
  else:
4765
5261
  cred = credential.Credential(
@@ -4771,7 +5267,7 @@ def doModifyMachineGroup(args, parsed_globals):
4771
5267
  endpoint=g_param[OptionsDefine.Endpoint],
4772
5268
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4773
5269
  )
4774
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5270
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4775
5271
  if g_param[OptionsDefine.Language]:
4776
5272
  profile.language = g_param[OptionsDefine.Language]
4777
5273
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4811,7 +5307,10 @@ def doDescribeScheduledSqlInfo(args, parsed_globals):
4811
5307
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4812
5308
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4813
5309
  )
4814
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5310
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5311
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5312
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5313
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
5314
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4816
5315
  else:
4817
5316
  cred = credential.Credential(
@@ -4823,7 +5322,7 @@ def doDescribeScheduledSqlInfo(args, parsed_globals):
4823
5322
  endpoint=g_param[OptionsDefine.Endpoint],
4824
5323
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4825
5324
  )
4826
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5325
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4827
5326
  if g_param[OptionsDefine.Language]:
4828
5327
  profile.language = g_param[OptionsDefine.Language]
4829
5328
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4863,7 +5362,10 @@ def doDeleteConfig(args, parsed_globals):
4863
5362
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4864
5363
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4865
5364
  )
4866
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5365
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5366
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5367
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5368
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4867
5369
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4868
5370
  else:
4869
5371
  cred = credential.Credential(
@@ -4875,7 +5377,7 @@ def doDeleteConfig(args, parsed_globals):
4875
5377
  endpoint=g_param[OptionsDefine.Endpoint],
4876
5378
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4877
5379
  )
4878
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5380
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4879
5381
  if g_param[OptionsDefine.Language]:
4880
5382
  profile.language = g_param[OptionsDefine.Language]
4881
5383
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4915,7 +5417,10 @@ def doDescribeConfigExtras(args, parsed_globals):
4915
5417
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4916
5418
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4917
5419
  )
4918
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5420
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5421
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5422
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5423
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4919
5424
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4920
5425
  else:
4921
5426
  cred = credential.Credential(
@@ -4927,7 +5432,7 @@ def doDescribeConfigExtras(args, parsed_globals):
4927
5432
  endpoint=g_param[OptionsDefine.Endpoint],
4928
5433
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4929
5434
  )
4930
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5435
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4931
5436
  if g_param[OptionsDefine.Language]:
4932
5437
  profile.language = g_param[OptionsDefine.Language]
4933
5438
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4967,7 +5472,10 @@ def doCheckRechargeKafkaServer(args, parsed_globals):
4967
5472
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4968
5473
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4969
5474
  )
4970
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5475
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5476
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5477
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5478
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4971
5479
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4972
5480
  else:
4973
5481
  cred = credential.Credential(
@@ -4979,7 +5487,7 @@ def doCheckRechargeKafkaServer(args, parsed_globals):
4979
5487
  endpoint=g_param[OptionsDefine.Endpoint],
4980
5488
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4981
5489
  )
4982
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5490
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4983
5491
  if g_param[OptionsDefine.Language]:
4984
5492
  profile.language = g_param[OptionsDefine.Language]
4985
5493
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5019,7 +5527,10 @@ def doModifyAlarm(args, parsed_globals):
5019
5527
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5020
5528
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5021
5529
  )
5022
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5530
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5531
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5532
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5533
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5023
5534
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5024
5535
  else:
5025
5536
  cred = credential.Credential(
@@ -5031,7 +5542,7 @@ def doModifyAlarm(args, parsed_globals):
5031
5542
  endpoint=g_param[OptionsDefine.Endpoint],
5032
5543
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5033
5544
  )
5034
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5545
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5035
5546
  if g_param[OptionsDefine.Language]:
5036
5547
  profile.language = g_param[OptionsDefine.Language]
5037
5548
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5071,7 +5582,10 @@ def doDescribeShippers(args, parsed_globals):
5071
5582
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5072
5583
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5073
5584
  )
5074
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5585
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5586
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5587
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5588
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5075
5589
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5076
5590
  else:
5077
5591
  cred = credential.Credential(
@@ -5083,7 +5597,7 @@ def doDescribeShippers(args, parsed_globals):
5083
5597
  endpoint=g_param[OptionsDefine.Endpoint],
5084
5598
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5085
5599
  )
5086
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5600
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5087
5601
  if g_param[OptionsDefine.Language]:
5088
5602
  profile.language = g_param[OptionsDefine.Language]
5089
5603
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5123,7 +5637,10 @@ def doModifyKafkaConsumerGroupOffset(args, parsed_globals):
5123
5637
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5124
5638
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5125
5639
  )
5126
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5640
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5641
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5642
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5643
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5127
5644
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5128
5645
  else:
5129
5646
  cred = credential.Credential(
@@ -5135,7 +5652,7 @@ def doModifyKafkaConsumerGroupOffset(args, parsed_globals):
5135
5652
  endpoint=g_param[OptionsDefine.Endpoint],
5136
5653
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5137
5654
  )
5138
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5655
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5139
5656
  if g_param[OptionsDefine.Language]:
5140
5657
  profile.language = g_param[OptionsDefine.Language]
5141
5658
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5175,7 +5692,10 @@ def doModifyConsoleSharing(args, parsed_globals):
5175
5692
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5176
5693
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5177
5694
  )
5178
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5695
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5696
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5697
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5698
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5179
5699
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5180
5700
  else:
5181
5701
  cred = credential.Credential(
@@ -5187,7 +5707,7 @@ def doModifyConsoleSharing(args, parsed_globals):
5187
5707
  endpoint=g_param[OptionsDefine.Endpoint],
5188
5708
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5189
5709
  )
5190
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5710
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5191
5711
  if g_param[OptionsDefine.Language]:
5192
5712
  profile.language = g_param[OptionsDefine.Language]
5193
5713
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5227,7 +5747,10 @@ def doDescribeKafkaConsumerGroupDetail(args, parsed_globals):
5227
5747
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5228
5748
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5229
5749
  )
5230
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5750
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5751
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5752
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5753
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5231
5754
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5232
5755
  else:
5233
5756
  cred = credential.Credential(
@@ -5239,7 +5762,7 @@ def doDescribeKafkaConsumerGroupDetail(args, parsed_globals):
5239
5762
  endpoint=g_param[OptionsDefine.Endpoint],
5240
5763
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5241
5764
  )
5242
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5765
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5243
5766
  if g_param[OptionsDefine.Language]:
5244
5767
  profile.language = g_param[OptionsDefine.Language]
5245
5768
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5279,7 +5802,10 @@ def doDescribeDashboards(args, parsed_globals):
5279
5802
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5280
5803
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5281
5804
  )
5282
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5805
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5806
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5807
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5808
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5283
5809
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5284
5810
  else:
5285
5811
  cred = credential.Credential(
@@ -5291,7 +5817,7 @@ def doDescribeDashboards(args, parsed_globals):
5291
5817
  endpoint=g_param[OptionsDefine.Endpoint],
5292
5818
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5293
5819
  )
5294
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5820
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5295
5821
  if g_param[OptionsDefine.Language]:
5296
5822
  profile.language = g_param[OptionsDefine.Language]
5297
5823
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5331,7 +5857,10 @@ def doPreviewKafkaRecharge(args, parsed_globals):
5331
5857
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5332
5858
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5333
5859
  )
5334
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5860
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5861
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5862
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5863
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5335
5864
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5336
5865
  else:
5337
5866
  cred = credential.Credential(
@@ -5343,7 +5872,7 @@ def doPreviewKafkaRecharge(args, parsed_globals):
5343
5872
  endpoint=g_param[OptionsDefine.Endpoint],
5344
5873
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5345
5874
  )
5346
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5875
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5347
5876
  if g_param[OptionsDefine.Language]:
5348
5877
  profile.language = g_param[OptionsDefine.Language]
5349
5878
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5383,7 +5912,10 @@ def doModifyConfig(args, parsed_globals):
5383
5912
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5384
5913
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5385
5914
  )
5386
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5915
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5916
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5917
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5918
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5387
5919
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5388
5920
  else:
5389
5921
  cred = credential.Credential(
@@ -5395,7 +5927,7 @@ def doModifyConfig(args, parsed_globals):
5395
5927
  endpoint=g_param[OptionsDefine.Endpoint],
5396
5928
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5397
5929
  )
5398
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5930
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5399
5931
  if g_param[OptionsDefine.Language]:
5400
5932
  profile.language = g_param[OptionsDefine.Language]
5401
5933
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5435,7 +5967,10 @@ def doUploadLog(args, parsed_globals):
5435
5967
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5436
5968
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5437
5969
  )
5438
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5970
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5971
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5972
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5973
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5439
5974
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5440
5975
  else:
5441
5976
  cred = credential.Credential(
@@ -5494,7 +6029,10 @@ def doDeleteTopic(args, parsed_globals):
5494
6029
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5495
6030
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5496
6031
  )
5497
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6032
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6033
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6034
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6035
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5498
6036
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5499
6037
  else:
5500
6038
  cred = credential.Credential(
@@ -5506,7 +6044,7 @@ def doDeleteTopic(args, parsed_globals):
5506
6044
  endpoint=g_param[OptionsDefine.Endpoint],
5507
6045
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5508
6046
  )
5509
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6047
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5510
6048
  if g_param[OptionsDefine.Language]:
5511
6049
  profile.language = g_param[OptionsDefine.Language]
5512
6050
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5546,7 +6084,10 @@ def doModifyLogset(args, parsed_globals):
5546
6084
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5547
6085
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5548
6086
  )
5549
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6087
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6088
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6089
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6090
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5550
6091
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5551
6092
  else:
5552
6093
  cred = credential.Credential(
@@ -5558,7 +6099,7 @@ def doModifyLogset(args, parsed_globals):
5558
6099
  endpoint=g_param[OptionsDefine.Endpoint],
5559
6100
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5560
6101
  )
5561
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6102
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5562
6103
  if g_param[OptionsDefine.Language]:
5563
6104
  profile.language = g_param[OptionsDefine.Language]
5564
6105
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5598,7 +6139,10 @@ def doModifyConsumer(args, parsed_globals):
5598
6139
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5599
6140
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5600
6141
  )
5601
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6142
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6143
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6144
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6145
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5602
6146
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5603
6147
  else:
5604
6148
  cred = credential.Credential(
@@ -5610,7 +6154,7 @@ def doModifyConsumer(args, parsed_globals):
5610
6154
  endpoint=g_param[OptionsDefine.Endpoint],
5611
6155
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5612
6156
  )
5613
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6157
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5614
6158
  if g_param[OptionsDefine.Language]:
5615
6159
  profile.language = g_param[OptionsDefine.Language]
5616
6160
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5650,7 +6194,10 @@ def doModifyDataTransform(args, parsed_globals):
5650
6194
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5651
6195
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5652
6196
  )
5653
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6197
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6198
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6199
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6200
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5654
6201
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5655
6202
  else:
5656
6203
  cred = credential.Credential(
@@ -5662,7 +6209,7 @@ def doModifyDataTransform(args, parsed_globals):
5662
6209
  endpoint=g_param[OptionsDefine.Endpoint],
5663
6210
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5664
6211
  )
5665
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6212
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5666
6213
  if g_param[OptionsDefine.Language]:
5667
6214
  profile.language = g_param[OptionsDefine.Language]
5668
6215
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5702,7 +6249,10 @@ def doSearchLog(args, parsed_globals):
5702
6249
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5703
6250
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5704
6251
  )
5705
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6252
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6253
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6254
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6255
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5706
6256
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5707
6257
  else:
5708
6258
  cred = credential.Credential(
@@ -5714,7 +6264,7 @@ def doSearchLog(args, parsed_globals):
5714
6264
  endpoint=g_param[OptionsDefine.Endpoint],
5715
6265
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5716
6266
  )
5717
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6267
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5718
6268
  if g_param[OptionsDefine.Language]:
5719
6269
  profile.language = g_param[OptionsDefine.Language]
5720
6270
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5754,7 +6304,10 @@ def doDescribeLogContext(args, parsed_globals):
5754
6304
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5755
6305
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5756
6306
  )
5757
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6307
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6308
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6309
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6310
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5758
6311
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5759
6312
  else:
5760
6313
  cred = credential.Credential(
@@ -5766,7 +6319,7 @@ def doDescribeLogContext(args, parsed_globals):
5766
6319
  endpoint=g_param[OptionsDefine.Endpoint],
5767
6320
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5768
6321
  )
5769
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6322
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5770
6323
  if g_param[OptionsDefine.Language]:
5771
6324
  profile.language = g_param[OptionsDefine.Language]
5772
6325
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5806,7 +6359,10 @@ def doDescribeConsumer(args, parsed_globals):
5806
6359
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5807
6360
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5808
6361
  )
5809
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6362
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6363
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6364
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6365
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5810
6366
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5811
6367
  else:
5812
6368
  cred = credential.Credential(
@@ -5818,7 +6374,7 @@ def doDescribeConsumer(args, parsed_globals):
5818
6374
  endpoint=g_param[OptionsDefine.Endpoint],
5819
6375
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5820
6376
  )
5821
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6377
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5822
6378
  if g_param[OptionsDefine.Language]:
5823
6379
  profile.language = g_param[OptionsDefine.Language]
5824
6380
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5858,7 +6414,10 @@ def doDescribeNoticeContents(args, parsed_globals):
5858
6414
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5859
6415
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5860
6416
  )
5861
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6417
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6418
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6419
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6420
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5862
6421
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5863
6422
  else:
5864
6423
  cred = credential.Credential(
@@ -5870,7 +6429,7 @@ def doDescribeNoticeContents(args, parsed_globals):
5870
6429
  endpoint=g_param[OptionsDefine.Endpoint],
5871
6430
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5872
6431
  )
5873
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6432
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5874
6433
  if g_param[OptionsDefine.Language]:
5875
6434
  profile.language = g_param[OptionsDefine.Language]
5876
6435
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5910,7 +6469,10 @@ def doDescribeMachines(args, parsed_globals):
5910
6469
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5911
6470
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5912
6471
  )
5913
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6472
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6473
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6474
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6475
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5914
6476
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5915
6477
  else:
5916
6478
  cred = credential.Credential(
@@ -5922,7 +6484,7 @@ def doDescribeMachines(args, parsed_globals):
5922
6484
  endpoint=g_param[OptionsDefine.Endpoint],
5923
6485
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5924
6486
  )
5925
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6487
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5926
6488
  if g_param[OptionsDefine.Language]:
5927
6489
  profile.language = g_param[OptionsDefine.Language]
5928
6490
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -5962,7 +6524,10 @@ def doRetryShipperTask(args, parsed_globals):
5962
6524
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5963
6525
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5964
6526
  )
5965
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6527
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6528
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6529
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6530
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5966
6531
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5967
6532
  else:
5968
6533
  cred = credential.Credential(
@@ -5974,7 +6539,7 @@ def doRetryShipperTask(args, parsed_globals):
5974
6539
  endpoint=g_param[OptionsDefine.Endpoint],
5975
6540
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5976
6541
  )
5977
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6542
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5978
6543
  if g_param[OptionsDefine.Language]:
5979
6544
  profile.language = g_param[OptionsDefine.Language]
5980
6545
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -6014,7 +6579,10 @@ def doCreateAlarm(args, parsed_globals):
6014
6579
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
6015
6580
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
6016
6581
  )
6017
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6582
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6583
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6584
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6585
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6018
6586
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
6019
6587
  else:
6020
6588
  cred = credential.Credential(
@@ -6026,7 +6594,7 @@ def doCreateAlarm(args, parsed_globals):
6026
6594
  endpoint=g_param[OptionsDefine.Endpoint],
6027
6595
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
6028
6596
  )
6029
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6597
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
6030
6598
  if g_param[OptionsDefine.Language]:
6031
6599
  profile.language = g_param[OptionsDefine.Language]
6032
6600
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -6066,7 +6634,10 @@ def doCreateScheduledSql(args, parsed_globals):
6066
6634
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
6067
6635
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
6068
6636
  )
6069
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6637
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
6638
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
6639
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
6640
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6070
6641
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
6071
6642
  else:
6072
6643
  cred = credential.Credential(
@@ -6078,7 +6649,7 @@ def doCreateScheduledSql(args, parsed_globals):
6078
6649
  endpoint=g_param[OptionsDefine.Endpoint],
6079
6650
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
6080
6651
  )
6081
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6652
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
6082
6653
  if g_param[OptionsDefine.Language]:
6083
6654
  profile.language = g_param[OptionsDefine.Language]
6084
6655
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -6126,7 +6697,7 @@ ACTION_MAP = {
6126
6697
  "DeleteCloudProductLogCollection": doDeleteCloudProductLogCollection,
6127
6698
  "CreateIndex": doCreateIndex,
6128
6699
  "QueryMetric": doQueryMetric,
6129
- "ModifyShipper": doModifyShipper,
6700
+ "ModifyDlcDeliver": doModifyDlcDeliver,
6130
6701
  "CreateKafkaRecharge": doCreateKafkaRecharge,
6131
6702
  "DescribeConfigs": doDescribeConfigs,
6132
6703
  "CreateDeliverCloudFunction": doCreateDeliverCloudFunction,
@@ -6143,20 +6714,22 @@ ACTION_MAP = {
6143
6714
  "DescribeLogsets": doDescribeLogsets,
6144
6715
  "DescribeTopics": doDescribeTopics,
6145
6716
  "CreateCloudProductLogCollection": doCreateCloudProductLogCollection,
6146
- "CreateAlarmNotice": doCreateAlarmNotice,
6147
6717
  "CreateCosRecharge": doCreateCosRecharge,
6148
6718
  "MergePartition": doMergePartition,
6149
6719
  "ModifyAlarmNotice": doModifyAlarmNotice,
6150
6720
  "CreateExport": doCreateExport,
6151
6721
  "CloseKafkaConsumer": doCloseKafkaConsumer,
6722
+ "CreateDlcDeliver": doCreateDlcDeliver,
6152
6723
  "ModifyIndex": doModifyIndex,
6153
6724
  "DescribeIndex": doDescribeIndex,
6154
6725
  "ModifyCloudProductLogCollection": doModifyCloudProductLogCollection,
6155
6726
  "CreateAlarmShield": doCreateAlarmShield,
6727
+ "DeleteDlcDeliver": doDeleteDlcDeliver,
6156
6728
  "CreateShipper": doCreateShipper,
6157
6729
  "CreateNoticeContent": doCreateNoticeContent,
6158
6730
  "DeleteConsumer": doDeleteConsumer,
6159
6731
  "DeleteMachineGroup": doDeleteMachineGroup,
6732
+ "DescribeConfigMachineGroups": doDescribeConfigMachineGroups,
6160
6733
  "DeleteCosRecharge": doDeleteCosRecharge,
6161
6734
  "DescribeKafkaConsumerGroupList": doDescribeKafkaConsumerGroupList,
6162
6735
  "DescribeKafkaRecharges": doDescribeKafkaRecharges,
@@ -6168,6 +6741,7 @@ ACTION_MAP = {
6168
6741
  "DeleteScheduledSql": doDeleteScheduledSql,
6169
6742
  "OpenKafkaConsumer": doOpenKafkaConsumer,
6170
6743
  "CreateDashboardSubscribe": doCreateDashboardSubscribe,
6744
+ "ModifyShipper": doModifyShipper,
6171
6745
  "ModifyDashboardSubscribe": doModifyDashboardSubscribe,
6172
6746
  "DeleteIndex": doDeleteIndex,
6173
6747
  "DeleteWebCallback": doDeleteWebCallback,
@@ -6193,18 +6767,19 @@ ACTION_MAP = {
6193
6767
  "CreateDataTransform": doCreateDataTransform,
6194
6768
  "AddMachineGroupInfo": doAddMachineGroupInfo,
6195
6769
  "DeleteNoticeContent": doDeleteNoticeContent,
6196
- "DeleteConsoleSharing": doDeleteConsoleSharing,
6770
+ "DescribeDataTransformInfo": doDescribeDataTransformInfo,
6197
6771
  "DescribeAlarmNotices": doDescribeAlarmNotices,
6198
6772
  "DescribePartitions": doDescribePartitions,
6199
6773
  "CreateLogset": doCreateLogset,
6200
6774
  "CheckFunction": doCheckFunction,
6201
6775
  "DeleteAlarm": doDeleteAlarm,
6202
6776
  "DeleteShipper": doDeleteShipper,
6777
+ "DescribeDlcDelivers": doDescribeDlcDelivers,
6203
6778
  "QueryRangeMetric": doQueryRangeMetric,
6204
- "DescribeConfigMachineGroups": doDescribeConfigMachineGroups,
6779
+ "CreateAlarmNotice": doCreateAlarmNotice,
6205
6780
  "DeleteExport": doDeleteExport,
6206
6781
  "SplitPartition": doSplitPartition,
6207
- "DescribeDataTransformInfo": doDescribeDataTransformInfo,
6782
+ "DeleteConsoleSharing": doDeleteConsoleSharing,
6208
6783
  "DescribeMachineGroups": doDescribeMachineGroups,
6209
6784
  "CreateConsumer": doCreateConsumer,
6210
6785
  "ModifyTopic": doModifyTopic,