tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
|
@@ -27,7 +27,10 @@ def doResumeServerless(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doResumeServerless(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDescribeBackupConfig(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDescribeBackupConfig(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doReplayInstanceAuditLog(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doReplayInstanceAuditLog(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doModifyBinlogConfig(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doModifyBinlogConfig(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -225,6 +237,61 @@ def doModifyBinlogConfig(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
240
|
+
def doCreateIntegrateCluster(args, parsed_globals):
|
|
241
|
+
g_param = parse_global_arg(parsed_globals)
|
|
242
|
+
|
|
243
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
244
|
+
cred = credential.CVMRoleCredential()
|
|
245
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
246
|
+
cred = credential.STSAssumeRoleCredential(
|
|
247
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
248
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
249
|
+
)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
254
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
255
|
+
else:
|
|
256
|
+
cred = credential.Credential(
|
|
257
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
258
|
+
)
|
|
259
|
+
http_profile = HttpProfile(
|
|
260
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
261
|
+
reqMethod="POST",
|
|
262
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
263
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
264
|
+
)
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
266
|
+
if g_param[OptionsDefine.Language]:
|
|
267
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
268
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
269
|
+
client = mod.CynosdbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
270
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
271
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
272
|
+
model = models.CreateIntegrateClusterRequest()
|
|
273
|
+
model.from_json_string(json.dumps(args))
|
|
274
|
+
start_time = time.time()
|
|
275
|
+
while True:
|
|
276
|
+
rsp = client.CreateIntegrateCluster(model)
|
|
277
|
+
result = rsp.to_json_string()
|
|
278
|
+
try:
|
|
279
|
+
json_obj = json.loads(result)
|
|
280
|
+
except TypeError as e:
|
|
281
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
282
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
283
|
+
break
|
|
284
|
+
cur_time = time.time()
|
|
285
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
286
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
287
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
288
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
289
|
+
else:
|
|
290
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
291
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
292
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
293
|
+
|
|
294
|
+
|
|
228
295
|
def doCreateProxyEndPoint(args, parsed_globals):
|
|
229
296
|
g_param = parse_global_arg(parsed_globals)
|
|
230
297
|
|
|
@@ -235,7 +302,10 @@ def doCreateProxyEndPoint(args, parsed_globals):
|
|
|
235
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
304
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
310
|
else:
|
|
241
311
|
cred = credential.Credential(
|
|
@@ -247,7 +317,7 @@ def doCreateProxyEndPoint(args, parsed_globals):
|
|
|
247
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
319
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
321
|
if g_param[OptionsDefine.Language]:
|
|
252
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +357,10 @@ def doModifyResourcePackageClusters(args, parsed_globals):
|
|
|
287
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
359
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
365
|
else:
|
|
293
366
|
cred = credential.Credential(
|
|
@@ -299,7 +372,7 @@ def doModifyResourcePackageClusters(args, parsed_globals):
|
|
|
299
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
374
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
376
|
if g_param[OptionsDefine.Language]:
|
|
304
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +412,10 @@ def doCreateAuditRuleTemplate(args, parsed_globals):
|
|
|
339
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
414
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
420
|
else:
|
|
345
421
|
cred = credential.Credential(
|
|
@@ -351,7 +427,7 @@ def doCreateAuditRuleTemplate(args, parsed_globals):
|
|
|
351
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
429
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
431
|
if g_param[OptionsDefine.Language]:
|
|
356
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +467,10 @@ def doGrantAccountPrivileges(args, parsed_globals):
|
|
|
391
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
469
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
475
|
else:
|
|
397
476
|
cred = credential.Credential(
|
|
@@ -403,7 +482,7 @@ def doGrantAccountPrivileges(args, parsed_globals):
|
|
|
403
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
484
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
486
|
if g_param[OptionsDefine.Language]:
|
|
408
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +522,10 @@ def doDescribeClusterParamLogs(args, parsed_globals):
|
|
|
443
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
524
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
530
|
else:
|
|
449
531
|
cred = credential.Credential(
|
|
@@ -455,7 +537,7 @@ def doDescribeClusterParamLogs(args, parsed_globals):
|
|
|
455
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
539
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
541
|
if g_param[OptionsDefine.Language]:
|
|
460
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +577,10 @@ def doModifyMaintainPeriodConfig(args, parsed_globals):
|
|
|
495
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
579
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
585
|
else:
|
|
501
586
|
cred = credential.Credential(
|
|
@@ -507,7 +592,7 @@ def doModifyMaintainPeriodConfig(args, parsed_globals):
|
|
|
507
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
594
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
596
|
if g_param[OptionsDefine.Language]:
|
|
512
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +632,10 @@ def doCopyClusterPasswordComplexity(args, parsed_globals):
|
|
|
547
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
634
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
640
|
else:
|
|
553
641
|
cred = credential.Credential(
|
|
@@ -559,7 +647,7 @@ def doCopyClusterPasswordComplexity(args, parsed_globals):
|
|
|
559
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
649
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
651
|
if g_param[OptionsDefine.Language]:
|
|
564
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +687,10 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
599
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
689
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
695
|
else:
|
|
605
696
|
cred = credential.Credential(
|
|
@@ -611,7 +702,7 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
611
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
704
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
706
|
if g_param[OptionsDefine.Language]:
|
|
616
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +742,10 @@ def doDescribeResourcePackageList(args, parsed_globals):
|
|
|
651
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
744
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
750
|
else:
|
|
657
751
|
cred = credential.Credential(
|
|
@@ -663,7 +757,7 @@ def doDescribeResourcePackageList(args, parsed_globals):
|
|
|
663
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
759
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
761
|
if g_param[OptionsDefine.Language]:
|
|
668
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +797,10 @@ def doDescribeSupportProxyVersion(args, parsed_globals):
|
|
|
703
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
799
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
805
|
else:
|
|
709
806
|
cred = credential.Credential(
|
|
@@ -715,7 +812,7 @@ def doDescribeSupportProxyVersion(args, parsed_globals):
|
|
|
715
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
814
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
816
|
if g_param[OptionsDefine.Language]:
|
|
720
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +852,10 @@ def doCreateAuditLogFile(args, parsed_globals):
|
|
|
755
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
854
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
860
|
else:
|
|
761
861
|
cred = credential.Credential(
|
|
@@ -767,7 +867,7 @@ def doCreateAuditLogFile(args, parsed_globals):
|
|
|
767
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
869
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
871
|
if g_param[OptionsDefine.Language]:
|
|
772
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +907,10 @@ def doDescribeSlaveZones(args, parsed_globals):
|
|
|
807
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
909
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
915
|
else:
|
|
813
916
|
cred = credential.Credential(
|
|
@@ -819,7 +922,7 @@ def doDescribeSlaveZones(args, parsed_globals):
|
|
|
819
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
924
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
926
|
if g_param[OptionsDefine.Language]:
|
|
824
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +962,10 @@ def doCloseProxyEndPoint(args, parsed_globals):
|
|
|
859
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
964
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
970
|
else:
|
|
865
971
|
cred = credential.Credential(
|
|
@@ -871,7 +977,7 @@ def doCloseProxyEndPoint(args, parsed_globals):
|
|
|
871
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
979
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
981
|
if g_param[OptionsDefine.Language]:
|
|
876
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +1017,10 @@ def doCloseProxy(args, parsed_globals):
|
|
|
911
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1019
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1025
|
else:
|
|
917
1026
|
cred = credential.Credential(
|
|
@@ -923,7 +1032,7 @@ def doCloseProxy(args, parsed_globals):
|
|
|
923
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
1034
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
1036
|
if g_param[OptionsDefine.Language]:
|
|
928
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1072,10 @@ def doDescribeProxySpecs(args, parsed_globals):
|
|
|
963
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1074
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1080
|
else:
|
|
969
1081
|
cred = credential.Credential(
|
|
@@ -975,7 +1087,7 @@ def doDescribeProxySpecs(args, parsed_globals):
|
|
|
975
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1089
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1091
|
if g_param[OptionsDefine.Language]:
|
|
980
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1127,10 @@ def doInquirePriceModify(args, parsed_globals):
|
|
|
1015
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1129
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1135
|
else:
|
|
1021
1136
|
cred = credential.Credential(
|
|
@@ -1027,7 +1142,7 @@ def doInquirePriceModify(args, parsed_globals):
|
|
|
1027
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1144
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1146
|
if g_param[OptionsDefine.Language]:
|
|
1032
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1182,10 @@ def doModifyDBInstanceSecurityGroups(args, parsed_globals):
|
|
|
1067
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1184
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1190
|
else:
|
|
1073
1191
|
cred = credential.Credential(
|
|
@@ -1079,7 +1197,7 @@ def doModifyDBInstanceSecurityGroups(args, parsed_globals):
|
|
|
1079
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1199
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1201
|
if g_param[OptionsDefine.Language]:
|
|
1084
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1119,7 +1237,10 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
1119
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1239
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1245
|
else:
|
|
1125
1246
|
cred = credential.Credential(
|
|
@@ -1131,7 +1252,7 @@ def doDescribeTasks(args, parsed_globals):
|
|
|
1131
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1254
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1256
|
if g_param[OptionsDefine.Language]:
|
|
1136
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1292,10 @@ def doDescribeInstanceSpecs(args, parsed_globals):
|
|
|
1171
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1294
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1300
|
else:
|
|
1177
1301
|
cred = credential.Credential(
|
|
@@ -1183,7 +1307,7 @@ def doDescribeInstanceSpecs(args, parsed_globals):
|
|
|
1183
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1309
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1311
|
if g_param[OptionsDefine.Language]:
|
|
1188
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1347,10 @@ def doDescribeBinlogDownloadUrl(args, parsed_globals):
|
|
|
1223
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1349
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1355
|
else:
|
|
1229
1356
|
cred = credential.Credential(
|
|
@@ -1235,7 +1362,7 @@ def doDescribeBinlogDownloadUrl(args, parsed_globals):
|
|
|
1235
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1364
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1366
|
if g_param[OptionsDefine.Language]:
|
|
1240
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1402,10 @@ def doDescribeResourcesByDealName(args, parsed_globals):
|
|
|
1275
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1404
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1410
|
else:
|
|
1281
1411
|
cred = credential.Credential(
|
|
@@ -1287,7 +1417,7 @@ def doDescribeResourcesByDealName(args, parsed_globals):
|
|
|
1287
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1419
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1421
|
if g_param[OptionsDefine.Language]:
|
|
1292
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1457,10 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
1327
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1459
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1465
|
else:
|
|
1333
1466
|
cred = credential.Credential(
|
|
@@ -1339,7 +1472,7 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
1339
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1474
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1476
|
if g_param[OptionsDefine.Language]:
|
|
1344
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1512,10 @@ def doDescribeBinlogConfig(args, parsed_globals):
|
|
|
1379
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1514
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1520
|
else:
|
|
1385
1521
|
cred = credential.Credential(
|
|
@@ -1391,7 +1527,7 @@ def doDescribeBinlogConfig(args, parsed_globals):
|
|
|
1391
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1529
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1531
|
if g_param[OptionsDefine.Language]:
|
|
1396
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1567,10 @@ def doExportResourcePackageDeductDetails(args, parsed_globals):
|
|
|
1431
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1569
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1575
|
else:
|
|
1437
1576
|
cred = credential.Credential(
|
|
@@ -1443,7 +1582,7 @@ def doExportResourcePackageDeductDetails(args, parsed_globals):
|
|
|
1443
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1584
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1586
|
if g_param[OptionsDefine.Language]:
|
|
1448
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1622,10 @@ def doModifyClusterStorage(args, parsed_globals):
|
|
|
1483
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1624
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1630
|
else:
|
|
1489
1631
|
cred = credential.Credential(
|
|
@@ -1495,7 +1637,7 @@ def doModifyClusterStorage(args, parsed_globals):
|
|
|
1495
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1639
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1641
|
if g_param[OptionsDefine.Language]:
|
|
1500
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1677,10 @@ def doActivateInstance(args, parsed_globals):
|
|
|
1535
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1679
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1685
|
else:
|
|
1541
1686
|
cred = credential.Credential(
|
|
@@ -1547,7 +1692,7 @@ def doActivateInstance(args, parsed_globals):
|
|
|
1547
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1694
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1696
|
if g_param[OptionsDefine.Language]:
|
|
1552
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1732,10 @@ def doDescribeProxyNodes(args, parsed_globals):
|
|
|
1587
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1734
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1740
|
else:
|
|
1593
1741
|
cred = credential.Credential(
|
|
@@ -1599,7 +1747,7 @@ def doDescribeProxyNodes(args, parsed_globals):
|
|
|
1599
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1749
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1751
|
if g_param[OptionsDefine.Language]:
|
|
1604
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1787,10 @@ def doDisassociateSecurityGroups(args, parsed_globals):
|
|
|
1639
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1789
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1795
|
else:
|
|
1645
1796
|
cred = credential.Credential(
|
|
@@ -1651,7 +1802,7 @@ def doDisassociateSecurityGroups(args, parsed_globals):
|
|
|
1651
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1804
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1806
|
if g_param[OptionsDefine.Language]:
|
|
1656
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1842,10 @@ def doDescribeClusterTransparentEncryptInfo(args, parsed_globals):
|
|
|
1691
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1844
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1850
|
else:
|
|
1697
1851
|
cred = credential.Credential(
|
|
@@ -1703,7 +1857,7 @@ def doDescribeClusterTransparentEncryptInfo(args, parsed_globals):
|
|
|
1703
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1859
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1861
|
if g_param[OptionsDefine.Language]:
|
|
1708
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +1897,10 @@ def doExportInstanceSlowQueries(args, parsed_globals):
|
|
|
1743
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1899
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1905
|
else:
|
|
1749
1906
|
cred = credential.Credential(
|
|
@@ -1755,7 +1912,7 @@ def doExportInstanceSlowQueries(args, parsed_globals):
|
|
|
1755
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1914
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1916
|
if g_param[OptionsDefine.Language]:
|
|
1760
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +1952,10 @@ def doDeleteCLSDelivery(args, parsed_globals):
|
|
|
1795
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1954
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1960
|
else:
|
|
1801
1961
|
cred = credential.Credential(
|
|
@@ -1807,7 +1967,7 @@ def doDeleteCLSDelivery(args, parsed_globals):
|
|
|
1807
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1969
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1971
|
if g_param[OptionsDefine.Language]:
|
|
1812
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +2007,10 @@ def doDescribeChangedParamsAfterUpgrade(args, parsed_globals):
|
|
|
1847
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2009
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2015
|
else:
|
|
1853
2016
|
cred = credential.Credential(
|
|
@@ -1859,7 +2022,7 @@ def doDescribeChangedParamsAfterUpgrade(args, parsed_globals):
|
|
|
1859
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2024
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2026
|
if g_param[OptionsDefine.Language]:
|
|
1864
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2062,10 @@ def doDescribeAccountPrivileges(args, parsed_globals):
|
|
|
1899
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2064
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2070
|
else:
|
|
1905
2071
|
cred = credential.Credential(
|
|
@@ -1911,7 +2077,7 @@ def doDescribeAccountPrivileges(args, parsed_globals):
|
|
|
1911
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2079
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2081
|
if g_param[OptionsDefine.Language]:
|
|
1916
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1951,7 +2117,10 @@ def doCloseClusterPasswordComplexity(args, parsed_globals):
|
|
|
1951
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2119
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2125
|
else:
|
|
1957
2126
|
cred = credential.Credential(
|
|
@@ -1963,7 +2132,7 @@ def doCloseClusterPasswordComplexity(args, parsed_globals):
|
|
|
1963
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2134
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2136
|
if g_param[OptionsDefine.Language]:
|
|
1968
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2172,10 @@ def doRollBackCluster(args, parsed_globals):
|
|
|
2003
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2174
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2180
|
else:
|
|
2009
2181
|
cred = credential.Credential(
|
|
@@ -2015,7 +2187,7 @@ def doRollBackCluster(args, parsed_globals):
|
|
|
2015
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2189
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2191
|
if g_param[OptionsDefine.Language]:
|
|
2020
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2227,10 @@ def doDescribeBinlogSaveDays(args, parsed_globals):
|
|
|
2055
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2229
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2235
|
else:
|
|
2061
2236
|
cred = credential.Credential(
|
|
@@ -2067,7 +2242,7 @@ def doDescribeBinlogSaveDays(args, parsed_globals):
|
|
|
2067
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2244
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2246
|
if g_param[OptionsDefine.Language]:
|
|
2072
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2282,10 @@ def doDescribeClusterInstanceGrps(args, parsed_globals):
|
|
|
2107
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2284
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2290
|
else:
|
|
2113
2291
|
cred = credential.Credential(
|
|
@@ -2119,7 +2297,7 @@ def doDescribeClusterInstanceGrps(args, parsed_globals):
|
|
|
2119
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2299
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2301
|
if g_param[OptionsDefine.Language]:
|
|
2124
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2149,7 +2327,7 @@ def doDescribeClusterInstanceGrps(args, parsed_globals):
|
|
|
2149
2327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2150
2328
|
|
|
2151
2329
|
|
|
2152
|
-
def
|
|
2330
|
+
def doDescribeIsolatedInstances(args, parsed_globals):
|
|
2153
2331
|
g_param = parse_global_arg(parsed_globals)
|
|
2154
2332
|
|
|
2155
2333
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2159,7 +2337,10 @@ def doUpgradeProxyVersion(args, parsed_globals):
|
|
|
2159
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2339
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2345
|
else:
|
|
2165
2346
|
cred = credential.Credential(
|
|
@@ -2171,18 +2352,18 @@ def doUpgradeProxyVersion(args, parsed_globals):
|
|
|
2171
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2354
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2356
|
if g_param[OptionsDefine.Language]:
|
|
2176
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2178
2359
|
client = mod.CynosdbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2179
2360
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2180
2361
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2181
|
-
model = models.
|
|
2362
|
+
model = models.DescribeIsolatedInstancesRequest()
|
|
2182
2363
|
model.from_json_string(json.dumps(args))
|
|
2183
2364
|
start_time = time.time()
|
|
2184
2365
|
while True:
|
|
2185
|
-
rsp = client.
|
|
2366
|
+
rsp = client.DescribeIsolatedInstances(model)
|
|
2186
2367
|
result = rsp.to_json_string()
|
|
2187
2368
|
try:
|
|
2188
2369
|
json_obj = json.loads(result)
|
|
@@ -2211,7 +2392,10 @@ def doModifyClusterName(args, parsed_globals):
|
|
|
2211
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2394
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2400
|
else:
|
|
2217
2401
|
cred = credential.Credential(
|
|
@@ -2223,7 +2407,7 @@ def doModifyClusterName(args, parsed_globals):
|
|
|
2223
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2409
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2411
|
if g_param[OptionsDefine.Language]:
|
|
2228
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2447,10 @@ def doModifyProxyRwSplit(args, parsed_globals):
|
|
|
2263
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2449
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2455
|
else:
|
|
2269
2456
|
cred = credential.Credential(
|
|
@@ -2275,7 +2462,7 @@ def doModifyProxyRwSplit(args, parsed_globals):
|
|
|
2275
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2464
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2466
|
if g_param[OptionsDefine.Language]:
|
|
2280
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2502,10 @@ def doModifyVipVport(args, parsed_globals):
|
|
|
2315
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2504
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2510
|
else:
|
|
2321
2511
|
cred = credential.Credential(
|
|
@@ -2327,7 +2517,7 @@ def doModifyVipVport(args, parsed_globals):
|
|
|
2327
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2519
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2521
|
if g_param[OptionsDefine.Language]:
|
|
2332
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2557,10 @@ def doDeleteAuditRuleTemplates(args, parsed_globals):
|
|
|
2367
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2559
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2565
|
else:
|
|
2373
2566
|
cred = credential.Credential(
|
|
@@ -2379,7 +2572,7 @@ def doDeleteAuditRuleTemplates(args, parsed_globals):
|
|
|
2379
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2574
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2576
|
if g_param[OptionsDefine.Language]:
|
|
2384
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2612,10 @@ def doModifyProxyDesc(args, parsed_globals):
|
|
|
2419
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2614
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2620
|
else:
|
|
2425
2621
|
cred = credential.Credential(
|
|
@@ -2431,7 +2627,7 @@ def doModifyProxyDesc(args, parsed_globals):
|
|
|
2431
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2629
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2631
|
if g_param[OptionsDefine.Language]:
|
|
2436
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2667,10 @@ def doCreateParamTemplate(args, parsed_globals):
|
|
|
2471
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2669
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2675
|
else:
|
|
2477
2676
|
cred = credential.Credential(
|
|
@@ -2483,7 +2682,7 @@ def doCreateParamTemplate(args, parsed_globals):
|
|
|
2483
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2684
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2686
|
if g_param[OptionsDefine.Language]:
|
|
2488
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2722,10 @@ def doModifyClusterSlaveZone(args, parsed_globals):
|
|
|
2523
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2724
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2730
|
else:
|
|
2529
2731
|
cred = credential.Credential(
|
|
@@ -2535,7 +2737,7 @@ def doModifyClusterSlaveZone(args, parsed_globals):
|
|
|
2535
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2739
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2741
|
if g_param[OptionsDefine.Language]:
|
|
2540
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2777,10 @@ def doModifyAccountParams(args, parsed_globals):
|
|
|
2575
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2779
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2785
|
else:
|
|
2581
2786
|
cred = credential.Credential(
|
|
@@ -2587,7 +2792,7 @@ def doModifyAccountParams(args, parsed_globals):
|
|
|
2587
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2794
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2796
|
if g_param[OptionsDefine.Language]:
|
|
2592
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2832,10 @@ def doModifyClusterPasswordComplexity(args, parsed_globals):
|
|
|
2627
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2834
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2840
|
else:
|
|
2633
2841
|
cred = credential.Credential(
|
|
@@ -2639,7 +2847,7 @@ def doModifyClusterPasswordComplexity(args, parsed_globals):
|
|
|
2639
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2849
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2851
|
if g_param[OptionsDefine.Language]:
|
|
2644
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2887,10 @@ def doCreateBackup(args, parsed_globals):
|
|
|
2679
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2889
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2895
|
else:
|
|
2685
2896
|
cred = credential.Credential(
|
|
@@ -2691,7 +2902,7 @@ def doCreateBackup(args, parsed_globals):
|
|
|
2691
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2904
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2906
|
if g_param[OptionsDefine.Language]:
|
|
2696
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +2942,10 @@ def doOfflineInstance(args, parsed_globals):
|
|
|
2731
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2944
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2950
|
else:
|
|
2737
2951
|
cred = credential.Credential(
|
|
@@ -2743,7 +2957,7 @@ def doOfflineInstance(args, parsed_globals):
|
|
|
2743
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2959
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2961
|
if g_param[OptionsDefine.Language]:
|
|
2748
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +2997,10 @@ def doIsolateCluster(args, parsed_globals):
|
|
|
2783
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
2999
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3005
|
else:
|
|
2789
3006
|
cred = credential.Credential(
|
|
@@ -2795,7 +3012,7 @@ def doIsolateCluster(args, parsed_globals):
|
|
|
2795
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3014
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3016
|
if g_param[OptionsDefine.Language]:
|
|
2800
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +3052,10 @@ def doDescribeInstancesWithinSameCluster(args, parsed_globals):
|
|
|
2835
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3054
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3060
|
else:
|
|
2841
3061
|
cred = credential.Credential(
|
|
@@ -2847,7 +3067,7 @@ def doDescribeInstancesWithinSameCluster(args, parsed_globals):
|
|
|
2847
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3069
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3071
|
if g_param[OptionsDefine.Language]:
|
|
2852
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +3107,10 @@ def doRestartInstance(args, parsed_globals):
|
|
|
2887
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3109
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3115
|
else:
|
|
2893
3116
|
cred = credential.Credential(
|
|
@@ -2899,7 +3122,7 @@ def doRestartInstance(args, parsed_globals):
|
|
|
2899
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3124
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3126
|
if g_param[OptionsDefine.Language]:
|
|
2904
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +3162,10 @@ def doUpgradeProxy(args, parsed_globals):
|
|
|
2939
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3164
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3170
|
else:
|
|
2945
3171
|
cred = credential.Credential(
|
|
@@ -2951,7 +3177,7 @@ def doUpgradeProxy(args, parsed_globals):
|
|
|
2951
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3179
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3181
|
if g_param[OptionsDefine.Language]:
|
|
2956
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2981,6 +3207,61 @@ def doUpgradeProxy(args, parsed_globals):
|
|
|
2981
3207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2982
3208
|
|
|
2983
3209
|
|
|
3210
|
+
def doInquirePriceMultiSpec(args, parsed_globals):
|
|
3211
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3212
|
+
|
|
3213
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3214
|
+
cred = credential.CVMRoleCredential()
|
|
3215
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3216
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3217
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3218
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3219
|
+
)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3224
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3225
|
+
else:
|
|
3226
|
+
cred = credential.Credential(
|
|
3227
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3228
|
+
)
|
|
3229
|
+
http_profile = HttpProfile(
|
|
3230
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3231
|
+
reqMethod="POST",
|
|
3232
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3233
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3234
|
+
)
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3236
|
+
if g_param[OptionsDefine.Language]:
|
|
3237
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3238
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3239
|
+
client = mod.CynosdbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3240
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3241
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3242
|
+
model = models.InquirePriceMultiSpecRequest()
|
|
3243
|
+
model.from_json_string(json.dumps(args))
|
|
3244
|
+
start_time = time.time()
|
|
3245
|
+
while True:
|
|
3246
|
+
rsp = client.InquirePriceMultiSpec(model)
|
|
3247
|
+
result = rsp.to_json_string()
|
|
3248
|
+
try:
|
|
3249
|
+
json_obj = json.loads(result)
|
|
3250
|
+
except TypeError as e:
|
|
3251
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3252
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3253
|
+
break
|
|
3254
|
+
cur_time = time.time()
|
|
3255
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3256
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3257
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3258
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3259
|
+
else:
|
|
3260
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3261
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3262
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3263
|
+
|
|
3264
|
+
|
|
2984
3265
|
def doDescribeClusters(args, parsed_globals):
|
|
2985
3266
|
g_param = parse_global_arg(parsed_globals)
|
|
2986
3267
|
|
|
@@ -2991,7 +3272,10 @@ def doDescribeClusters(args, parsed_globals):
|
|
|
2991
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3274
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3280
|
else:
|
|
2997
3281
|
cred = credential.Credential(
|
|
@@ -3003,7 +3287,7 @@ def doDescribeClusters(args, parsed_globals):
|
|
|
3003
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3289
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3291
|
if g_param[OptionsDefine.Language]:
|
|
3008
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3327,10 @@ def doCloseWan(args, parsed_globals):
|
|
|
3043
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3329
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3335
|
else:
|
|
3049
3336
|
cred = credential.Credential(
|
|
@@ -3055,7 +3342,7 @@ def doCloseWan(args, parsed_globals):
|
|
|
3055
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3344
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3346
|
if g_param[OptionsDefine.Language]:
|
|
3060
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3382,10 @@ def doDescribeProjectSecurityGroups(args, parsed_globals):
|
|
|
3095
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3384
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3390
|
else:
|
|
3101
3391
|
cred = credential.Credential(
|
|
@@ -3107,7 +3397,7 @@ def doDescribeProjectSecurityGroups(args, parsed_globals):
|
|
|
3107
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3399
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3401
|
if g_param[OptionsDefine.Language]:
|
|
3112
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3437,10 @@ def doModifyClusterDatabase(args, parsed_globals):
|
|
|
3147
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3439
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3445
|
else:
|
|
3153
3446
|
cred = credential.Credential(
|
|
@@ -3159,7 +3452,7 @@ def doModifyClusterDatabase(args, parsed_globals):
|
|
|
3159
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3454
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3456
|
if g_param[OptionsDefine.Language]:
|
|
3164
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3492,10 @@ def doDescribeClusterDatabaseTables(args, parsed_globals):
|
|
|
3199
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3494
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3500
|
else:
|
|
3205
3501
|
cred = credential.Credential(
|
|
@@ -3211,7 +3507,7 @@ def doDescribeClusterDatabaseTables(args, parsed_globals):
|
|
|
3211
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3509
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3511
|
if g_param[OptionsDefine.Language]:
|
|
3216
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3547,10 @@ def doDescribeBackupDownloadUserRestriction(args, parsed_globals):
|
|
|
3251
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3549
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3555
|
else:
|
|
3257
3556
|
cred = credential.Credential(
|
|
@@ -3263,7 +3562,7 @@ def doDescribeBackupDownloadUserRestriction(args, parsed_globals):
|
|
|
3263
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3564
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3566
|
if g_param[OptionsDefine.Language]:
|
|
3268
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3602,10 @@ def doModifyParamTemplate(args, parsed_globals):
|
|
|
3303
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3604
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3610
|
else:
|
|
3309
3611
|
cred = credential.Credential(
|
|
@@ -3315,7 +3617,7 @@ def doModifyParamTemplate(args, parsed_globals):
|
|
|
3315
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3619
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3621
|
if g_param[OptionsDefine.Language]:
|
|
3320
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3657,10 @@ def doModifyResourcePackagesDeductionPriority(args, parsed_globals):
|
|
|
3355
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3659
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3665
|
else:
|
|
3361
3666
|
cred = credential.Credential(
|
|
@@ -3367,7 +3672,7 @@ def doModifyResourcePackagesDeductionPriority(args, parsed_globals):
|
|
|
3367
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3674
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3676
|
if g_param[OptionsDefine.Language]:
|
|
3372
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3712,10 @@ def doDescribeInstanceParams(args, parsed_globals):
|
|
|
3407
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3714
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3720
|
else:
|
|
3413
3721
|
cred = credential.Credential(
|
|
@@ -3419,7 +3727,7 @@ def doDescribeInstanceParams(args, parsed_globals):
|
|
|
3419
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3729
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3731
|
if g_param[OptionsDefine.Language]:
|
|
3424
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3767,10 @@ def doDescribeInstanceSlowQueries(args, parsed_globals):
|
|
|
3459
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3769
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3775
|
else:
|
|
3465
3776
|
cred = credential.Credential(
|
|
@@ -3471,7 +3782,7 @@ def doDescribeInstanceSlowQueries(args, parsed_globals):
|
|
|
3471
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3784
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3786
|
if g_param[OptionsDefine.Language]:
|
|
3476
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +3822,10 @@ def doDescribeParamTemplateDetail(args, parsed_globals):
|
|
|
3511
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3824
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3830
|
else:
|
|
3517
3831
|
cred = credential.Credential(
|
|
@@ -3523,7 +3837,7 @@ def doDescribeParamTemplateDetail(args, parsed_globals):
|
|
|
3523
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3839
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3841
|
if g_param[OptionsDefine.Language]:
|
|
3528
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +3877,10 @@ def doDescribeClusterDatabases(args, parsed_globals):
|
|
|
3563
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3879
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3885
|
else:
|
|
3569
3886
|
cred = credential.Credential(
|
|
@@ -3575,7 +3892,7 @@ def doDescribeClusterDatabases(args, parsed_globals):
|
|
|
3575
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3894
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3896
|
if g_param[OptionsDefine.Language]:
|
|
3580
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +3932,10 @@ def doModifyClusterParam(args, parsed_globals):
|
|
|
3615
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3934
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3940
|
else:
|
|
3621
3941
|
cred = credential.Credential(
|
|
@@ -3627,7 +3947,7 @@ def doModifyClusterParam(args, parsed_globals):
|
|
|
3627
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
3949
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
3951
|
if g_param[OptionsDefine.Language]:
|
|
3632
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +3987,10 @@ def doCreateClusters(args, parsed_globals):
|
|
|
3667
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
3989
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
3995
|
else:
|
|
3673
3996
|
cred = credential.Credential(
|
|
@@ -3679,7 +4002,7 @@ def doCreateClusters(args, parsed_globals):
|
|
|
3679
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
4004
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
4006
|
if g_param[OptionsDefine.Language]:
|
|
3684
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +4042,10 @@ def doCreateAccounts(args, parsed_globals):
|
|
|
3719
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4044
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4050
|
else:
|
|
3725
4051
|
cred = credential.Credential(
|
|
@@ -3731,7 +4057,7 @@ def doCreateAccounts(args, parsed_globals):
|
|
|
3731
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4059
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4061
|
if g_param[OptionsDefine.Language]:
|
|
3736
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +4097,10 @@ def doRollbackToNewCluster(args, parsed_globals):
|
|
|
3771
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4099
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4105
|
else:
|
|
3777
4106
|
cred = credential.Credential(
|
|
@@ -3783,7 +4112,7 @@ def doRollbackToNewCluster(args, parsed_globals):
|
|
|
3783
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4114
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4116
|
if g_param[OptionsDefine.Language]:
|
|
3788
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +4152,10 @@ def doCreateResourcePackage(args, parsed_globals):
|
|
|
3823
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4154
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4160
|
else:
|
|
3829
4161
|
cred = credential.Credential(
|
|
@@ -3835,7 +4167,7 @@ def doCreateResourcePackage(args, parsed_globals):
|
|
|
3835
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4169
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4171
|
if g_param[OptionsDefine.Language]:
|
|
3840
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3875,7 +4207,10 @@ def doDescribeAuditLogFiles(args, parsed_globals):
|
|
|
3875
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4209
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4215
|
else:
|
|
3881
4216
|
cred = credential.Credential(
|
|
@@ -3887,7 +4222,7 @@ def doDescribeAuditLogFiles(args, parsed_globals):
|
|
|
3887
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4224
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4226
|
if g_param[OptionsDefine.Language]:
|
|
3892
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3927,7 +4262,10 @@ def doDeleteClusterDatabase(args, parsed_globals):
|
|
|
3927
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4264
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4270
|
else:
|
|
3933
4271
|
cred = credential.Credential(
|
|
@@ -3939,7 +4277,7 @@ def doDeleteClusterDatabase(args, parsed_globals):
|
|
|
3939
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4279
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4281
|
if g_param[OptionsDefine.Language]:
|
|
3944
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3979,7 +4317,10 @@ def doSwitchClusterZone(args, parsed_globals):
|
|
|
3979
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4319
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4325
|
else:
|
|
3985
4326
|
cred = credential.Credential(
|
|
@@ -3991,7 +4332,7 @@ def doSwitchClusterZone(args, parsed_globals):
|
|
|
3991
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4334
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4336
|
if g_param[OptionsDefine.Language]:
|
|
3996
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4031,7 +4372,10 @@ def doOpenClusterTransparentEncrypt(args, parsed_globals):
|
|
|
4031
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4374
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4380
|
else:
|
|
4037
4381
|
cred = credential.Credential(
|
|
@@ -4043,7 +4387,7 @@ def doOpenClusterTransparentEncrypt(args, parsed_globals):
|
|
|
4043
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4389
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4391
|
if g_param[OptionsDefine.Language]:
|
|
4048
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4083,7 +4427,10 @@ def doAddInstances(args, parsed_globals):
|
|
|
4083
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4429
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4435
|
else:
|
|
4089
4436
|
cred = credential.Credential(
|
|
@@ -4095,7 +4442,7 @@ def doAddInstances(args, parsed_globals):
|
|
|
4095
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4444
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4446
|
if g_param[OptionsDefine.Language]:
|
|
4100
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4135,7 +4482,10 @@ def doModifyInstanceUpgradeLimitDays(args, parsed_globals):
|
|
|
4135
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4484
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4490
|
else:
|
|
4141
4491
|
cred = credential.Credential(
|
|
@@ -4147,7 +4497,7 @@ def doModifyInstanceUpgradeLimitDays(args, parsed_globals):
|
|
|
4147
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4499
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4501
|
if g_param[OptionsDefine.Language]:
|
|
4152
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4187,7 +4537,10 @@ def doDeleteAccounts(args, parsed_globals):
|
|
|
4187
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4539
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4545
|
else:
|
|
4193
4546
|
cred = credential.Credential(
|
|
@@ -4199,7 +4552,7 @@ def doDeleteAccounts(args, parsed_globals):
|
|
|
4199
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4554
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4556
|
if g_param[OptionsDefine.Language]:
|
|
4204
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4239,7 +4592,10 @@ def doRevokeAccountPrivileges(args, parsed_globals):
|
|
|
4239
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4594
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4600
|
else:
|
|
4245
4601
|
cred = credential.Credential(
|
|
@@ -4251,7 +4607,7 @@ def doRevokeAccountPrivileges(args, parsed_globals):
|
|
|
4251
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4609
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4611
|
if g_param[OptionsDefine.Language]:
|
|
4256
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4291,7 +4647,10 @@ def doOpenClusterReadOnlyInstanceGroupAccess(args, parsed_globals):
|
|
|
4291
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4649
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4655
|
else:
|
|
4297
4656
|
cred = credential.Credential(
|
|
@@ -4303,7 +4662,7 @@ def doOpenClusterReadOnlyInstanceGroupAccess(args, parsed_globals):
|
|
|
4303
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4664
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4666
|
if g_param[OptionsDefine.Language]:
|
|
4308
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4343,7 +4702,10 @@ def doSearchClusterTables(args, parsed_globals):
|
|
|
4343
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4704
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4710
|
else:
|
|
4349
4711
|
cred = credential.Credential(
|
|
@@ -4355,7 +4717,7 @@ def doSearchClusterTables(args, parsed_globals):
|
|
|
4355
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4719
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4721
|
if g_param[OptionsDefine.Language]:
|
|
4360
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4395,7 +4757,10 @@ def doDescribeParamTemplates(args, parsed_globals):
|
|
|
4395
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4759
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4765
|
else:
|
|
4401
4766
|
cred = credential.Credential(
|
|
@@ -4407,7 +4772,7 @@ def doDescribeParamTemplates(args, parsed_globals):
|
|
|
4407
4772
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4773
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4774
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4776
|
if g_param[OptionsDefine.Language]:
|
|
4412
4777
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4778
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +4812,10 @@ def doDeleteBackup(args, parsed_globals):
|
|
|
4447
4812
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4813
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4814
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4820
|
else:
|
|
4453
4821
|
cred = credential.Credential(
|
|
@@ -4459,7 +4827,7 @@ def doDeleteBackup(args, parsed_globals):
|
|
|
4459
4827
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
4828
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
4829
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
4831
|
if g_param[OptionsDefine.Language]:
|
|
4464
4832
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
4833
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4499,7 +4867,10 @@ def doDescribeServerlessStrategy(args, parsed_globals):
|
|
|
4499
4867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4868
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4869
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4874
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4875
|
else:
|
|
4505
4876
|
cred = credential.Credential(
|
|
@@ -4511,7 +4882,7 @@ def doDescribeServerlessStrategy(args, parsed_globals):
|
|
|
4511
4882
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
4883
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
4884
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
4886
|
if g_param[OptionsDefine.Language]:
|
|
4516
4887
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
4888
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4551,7 +4922,10 @@ def doPauseServerless(args, parsed_globals):
|
|
|
4551
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
4924
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
4930
|
else:
|
|
4557
4931
|
cred = credential.Credential(
|
|
@@ -4563,7 +4937,7 @@ def doPauseServerless(args, parsed_globals):
|
|
|
4563
4937
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
4938
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
4939
|
)
|
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4567
4941
|
if g_param[OptionsDefine.Language]:
|
|
4568
4942
|
profile.language = g_param[OptionsDefine.Language]
|
|
4569
4943
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4603,7 +4977,10 @@ def doModifyAccountHost(args, parsed_globals):
|
|
|
4603
4977
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
4978
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
4979
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
4984
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
4985
|
else:
|
|
4609
4986
|
cred = credential.Credential(
|
|
@@ -4615,7 +4992,7 @@ def doModifyAccountHost(args, parsed_globals):
|
|
|
4615
4992
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4616
4993
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4617
4994
|
)
|
|
4618
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4619
4996
|
if g_param[OptionsDefine.Language]:
|
|
4620
4997
|
profile.language = g_param[OptionsDefine.Language]
|
|
4621
4998
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4655,7 +5032,10 @@ def doResetAccountPassword(args, parsed_globals):
|
|
|
4655
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
5034
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
5040
|
else:
|
|
4661
5041
|
cred = credential.Credential(
|
|
@@ -4667,7 +5047,7 @@ def doResetAccountPassword(args, parsed_globals):
|
|
|
4667
5047
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4668
5048
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4669
5049
|
)
|
|
4670
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4671
5051
|
if g_param[OptionsDefine.Language]:
|
|
4672
5052
|
profile.language = g_param[OptionsDefine.Language]
|
|
4673
5053
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4707,7 +5087,10 @@ def doDescribeInstanceDetail(args, parsed_globals):
|
|
|
4707
5087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4708
5088
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4709
5089
|
)
|
|
4710
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
5094
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
5095
|
else:
|
|
4713
5096
|
cred = credential.Credential(
|
|
@@ -4719,7 +5102,7 @@ def doDescribeInstanceDetail(args, parsed_globals):
|
|
|
4719
5102
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4720
5103
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4721
5104
|
)
|
|
4722
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4723
5106
|
if g_param[OptionsDefine.Language]:
|
|
4724
5107
|
profile.language = g_param[OptionsDefine.Language]
|
|
4725
5108
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4759,7 +5142,10 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
4759
5142
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
5143
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
5144
|
)
|
|
4762
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
5149
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
5150
|
else:
|
|
4765
5151
|
cred = credential.Credential(
|
|
@@ -4771,7 +5157,7 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
4771
5157
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4772
5158
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4773
5159
|
)
|
|
4774
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5160
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4775
5161
|
if g_param[OptionsDefine.Language]:
|
|
4776
5162
|
profile.language = g_param[OptionsDefine.Language]
|
|
4777
5163
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4811,7 +5197,10 @@ def doDescribeRollbackTimeRange(args, parsed_globals):
|
|
|
4811
5197
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4812
5198
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4813
5199
|
)
|
|
4814
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4815
5204
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4816
5205
|
else:
|
|
4817
5206
|
cred = credential.Credential(
|
|
@@ -4823,7 +5212,7 @@ def doDescribeRollbackTimeRange(args, parsed_globals):
|
|
|
4823
5212
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4824
5213
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4825
5214
|
)
|
|
4826
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5215
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4827
5216
|
if g_param[OptionsDefine.Language]:
|
|
4828
5217
|
profile.language = g_param[OptionsDefine.Language]
|
|
4829
5218
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4863,7 +5252,10 @@ def doDescribeFlow(args, parsed_globals):
|
|
|
4863
5252
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4864
5253
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4865
5254
|
)
|
|
4866
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4867
5259
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4868
5260
|
else:
|
|
4869
5261
|
cred = credential.Credential(
|
|
@@ -4875,7 +5267,7 @@ def doDescribeFlow(args, parsed_globals):
|
|
|
4875
5267
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4876
5268
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4877
5269
|
)
|
|
4878
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5270
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4879
5271
|
if g_param[OptionsDefine.Language]:
|
|
4880
5272
|
profile.language = g_param[OptionsDefine.Language]
|
|
4881
5273
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4915,7 +5307,10 @@ def doModifyInstanceParam(args, parsed_globals):
|
|
|
4915
5307
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4916
5308
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4917
5309
|
)
|
|
4918
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5310
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5311
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5312
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4919
5314
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4920
5315
|
else:
|
|
4921
5316
|
cred = credential.Credential(
|
|
@@ -4927,7 +5322,7 @@ def doModifyInstanceParam(args, parsed_globals):
|
|
|
4927
5322
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4928
5323
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4929
5324
|
)
|
|
4930
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5325
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4931
5326
|
if g_param[OptionsDefine.Language]:
|
|
4932
5327
|
profile.language = g_param[OptionsDefine.Language]
|
|
4933
5328
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4967,7 +5362,10 @@ def doDescribeInstanceCLSLogDelivery(args, parsed_globals):
|
|
|
4967
5362
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4968
5363
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4969
5364
|
)
|
|
4970
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5365
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5366
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5367
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4971
5369
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4972
5370
|
else:
|
|
4973
5371
|
cred = credential.Credential(
|
|
@@ -4979,7 +5377,7 @@ def doDescribeInstanceCLSLogDelivery(args, parsed_globals):
|
|
|
4979
5377
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4980
5378
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4981
5379
|
)
|
|
4982
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5380
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4983
5381
|
if g_param[OptionsDefine.Language]:
|
|
4984
5382
|
profile.language = g_param[OptionsDefine.Language]
|
|
4985
5383
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5019,7 +5417,10 @@ def doBindClusterResourcePackages(args, parsed_globals):
|
|
|
5019
5417
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5020
5418
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5021
5419
|
)
|
|
5022
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5420
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5421
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5422
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5023
5424
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5024
5425
|
else:
|
|
5025
5426
|
cred = credential.Credential(
|
|
@@ -5031,7 +5432,7 @@ def doBindClusterResourcePackages(args, parsed_globals):
|
|
|
5031
5432
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5032
5433
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5033
5434
|
)
|
|
5034
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5435
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5035
5436
|
if g_param[OptionsDefine.Language]:
|
|
5036
5437
|
profile.language = g_param[OptionsDefine.Language]
|
|
5037
5438
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5071,7 +5472,10 @@ def doDescribeServerlessInstanceSpecs(args, parsed_globals):
|
|
|
5071
5472
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5072
5473
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5073
5474
|
)
|
|
5074
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5475
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5476
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5477
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5075
5479
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5076
5480
|
else:
|
|
5077
5481
|
cred = credential.Credential(
|
|
@@ -5083,7 +5487,7 @@ def doDescribeServerlessInstanceSpecs(args, parsed_globals):
|
|
|
5083
5487
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5084
5488
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5085
5489
|
)
|
|
5086
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5490
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5087
5491
|
if g_param[OptionsDefine.Language]:
|
|
5088
5492
|
profile.language = g_param[OptionsDefine.Language]
|
|
5089
5493
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5123,7 +5527,10 @@ def doDescribeAuditLogs(args, parsed_globals):
|
|
|
5123
5527
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5124
5528
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5125
5529
|
)
|
|
5126
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5530
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5531
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5532
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5127
5534
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5128
5535
|
else:
|
|
5129
5536
|
cred = credential.Credential(
|
|
@@ -5135,7 +5542,7 @@ def doDescribeAuditLogs(args, parsed_globals):
|
|
|
5135
5542
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5136
5543
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5137
5544
|
)
|
|
5138
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5545
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5139
5546
|
if g_param[OptionsDefine.Language]:
|
|
5140
5547
|
profile.language = g_param[OptionsDefine.Language]
|
|
5141
5548
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5175,7 +5582,10 @@ def doUnbindClusterResourcePackages(args, parsed_globals):
|
|
|
5175
5582
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5176
5583
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5177
5584
|
)
|
|
5178
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5585
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5586
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5587
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5588
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5179
5589
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5180
5590
|
else:
|
|
5181
5591
|
cred = credential.Credential(
|
|
@@ -5187,7 +5597,7 @@ def doUnbindClusterResourcePackages(args, parsed_globals):
|
|
|
5187
5597
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5188
5598
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5189
5599
|
)
|
|
5190
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5600
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5191
5601
|
if g_param[OptionsDefine.Language]:
|
|
5192
5602
|
profile.language = g_param[OptionsDefine.Language]
|
|
5193
5603
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5227,7 +5637,10 @@ def doDescribeProxies(args, parsed_globals):
|
|
|
5227
5637
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5228
5638
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5229
5639
|
)
|
|
5230
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5640
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5641
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5642
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5643
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5231
5644
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5232
5645
|
else:
|
|
5233
5646
|
cred = credential.Credential(
|
|
@@ -5239,7 +5652,7 @@ def doDescribeProxies(args, parsed_globals):
|
|
|
5239
5652
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5240
5653
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5241
5654
|
)
|
|
5242
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5655
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5243
5656
|
if g_param[OptionsDefine.Language]:
|
|
5244
5657
|
profile.language = g_param[OptionsDefine.Language]
|
|
5245
5658
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5279,7 +5692,10 @@ def doOpenWan(args, parsed_globals):
|
|
|
5279
5692
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5280
5693
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5281
5694
|
)
|
|
5282
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5695
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5696
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5697
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5698
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5283
5699
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5284
5700
|
else:
|
|
5285
5701
|
cred = credential.Credential(
|
|
@@ -5291,7 +5707,7 @@ def doOpenWan(args, parsed_globals):
|
|
|
5291
5707
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5292
5708
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5293
5709
|
)
|
|
5294
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5710
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5295
5711
|
if g_param[OptionsDefine.Language]:
|
|
5296
5712
|
profile.language = g_param[OptionsDefine.Language]
|
|
5297
5713
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5331,7 +5747,10 @@ def doInquirePriceCreate(args, parsed_globals):
|
|
|
5331
5747
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5332
5748
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5333
5749
|
)
|
|
5334
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5750
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5751
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5752
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5753
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5335
5754
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5336
5755
|
else:
|
|
5337
5756
|
cred = credential.Credential(
|
|
@@ -5343,7 +5762,7 @@ def doInquirePriceCreate(args, parsed_globals):
|
|
|
5343
5762
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5344
5763
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5345
5764
|
)
|
|
5346
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5765
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5347
5766
|
if g_param[OptionsDefine.Language]:
|
|
5348
5767
|
profile.language = g_param[OptionsDefine.Language]
|
|
5349
5768
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5383,7 +5802,10 @@ def doAssociateSecurityGroups(args, parsed_globals):
|
|
|
5383
5802
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5384
5803
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5385
5804
|
)
|
|
5386
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5805
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5806
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5807
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5808
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5387
5809
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5388
5810
|
else:
|
|
5389
5811
|
cred = credential.Credential(
|
|
@@ -5395,7 +5817,7 @@ def doAssociateSecurityGroups(args, parsed_globals):
|
|
|
5395
5817
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5396
5818
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5397
5819
|
)
|
|
5398
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5820
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5399
5821
|
if g_param[OptionsDefine.Language]:
|
|
5400
5822
|
profile.language = g_param[OptionsDefine.Language]
|
|
5401
5823
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5435,7 +5857,10 @@ def doModifyBackupDownloadUserRestriction(args, parsed_globals):
|
|
|
5435
5857
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5436
5858
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5437
5859
|
)
|
|
5438
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5860
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5861
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5862
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5863
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5439
5864
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5440
5865
|
else:
|
|
5441
5866
|
cred = credential.Credential(
|
|
@@ -5447,7 +5872,7 @@ def doModifyBackupDownloadUserRestriction(args, parsed_globals):
|
|
|
5447
5872
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5448
5873
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5449
5874
|
)
|
|
5450
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5875
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5451
5876
|
if g_param[OptionsDefine.Language]:
|
|
5452
5877
|
profile.language = g_param[OptionsDefine.Language]
|
|
5453
5878
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5487,7 +5912,10 @@ def doDescribeResourcePackageSaleSpec(args, parsed_globals):
|
|
|
5487
5912
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5488
5913
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5489
5914
|
)
|
|
5490
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5915
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5916
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5917
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5918
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5491
5919
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5492
5920
|
else:
|
|
5493
5921
|
cred = credential.Credential(
|
|
@@ -5499,7 +5927,7 @@ def doDescribeResourcePackageSaleSpec(args, parsed_globals):
|
|
|
5499
5927
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5500
5928
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5501
5929
|
)
|
|
5502
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5930
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5503
5931
|
if g_param[OptionsDefine.Language]:
|
|
5504
5932
|
profile.language = g_param[OptionsDefine.Language]
|
|
5505
5933
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5539,7 +5967,10 @@ def doModifyAccountPrivileges(args, parsed_globals):
|
|
|
5539
5967
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5540
5968
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5541
5969
|
)
|
|
5542
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5970
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5971
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5972
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5973
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5543
5974
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5544
5975
|
else:
|
|
5545
5976
|
cred = credential.Credential(
|
|
@@ -5551,7 +5982,7 @@ def doModifyAccountPrivileges(args, parsed_globals):
|
|
|
5551
5982
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5552
5983
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5553
5984
|
)
|
|
5554
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5985
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5555
5986
|
if g_param[OptionsDefine.Language]:
|
|
5556
5987
|
profile.language = g_param[OptionsDefine.Language]
|
|
5557
5988
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5591,7 +6022,10 @@ def doDescribeAuditRuleWithInstanceIds(args, parsed_globals):
|
|
|
5591
6022
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5592
6023
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5593
6024
|
)
|
|
5594
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6025
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6026
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6027
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6028
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5595
6029
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5596
6030
|
else:
|
|
5597
6031
|
cred = credential.Credential(
|
|
@@ -5603,7 +6037,7 @@ def doDescribeAuditRuleWithInstanceIds(args, parsed_globals):
|
|
|
5603
6037
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5604
6038
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5605
6039
|
)
|
|
5606
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6040
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5607
6041
|
if g_param[OptionsDefine.Language]:
|
|
5608
6042
|
profile.language = g_param[OptionsDefine.Language]
|
|
5609
6043
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5643,7 +6077,10 @@ def doDescribeSSLStatus(args, parsed_globals):
|
|
|
5643
6077
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5644
6078
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5645
6079
|
)
|
|
5646
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6080
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6081
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6082
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6083
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5647
6084
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5648
6085
|
else:
|
|
5649
6086
|
cred = credential.Credential(
|
|
@@ -5655,7 +6092,7 @@ def doDescribeSSLStatus(args, parsed_globals):
|
|
|
5655
6092
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5656
6093
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5657
6094
|
)
|
|
5658
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6095
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5659
6096
|
if g_param[OptionsDefine.Language]:
|
|
5660
6097
|
profile.language = g_param[OptionsDefine.Language]
|
|
5661
6098
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5695,7 +6132,10 @@ def doExportInstanceErrorLogs(args, parsed_globals):
|
|
|
5695
6132
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5696
6133
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5697
6134
|
)
|
|
5698
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6135
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6136
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6137
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6138
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5699
6139
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5700
6140
|
else:
|
|
5701
6141
|
cred = credential.Credential(
|
|
@@ -5707,7 +6147,7 @@ def doExportInstanceErrorLogs(args, parsed_globals):
|
|
|
5707
6147
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5708
6148
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5709
6149
|
)
|
|
5710
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6150
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5711
6151
|
if g_param[OptionsDefine.Language]:
|
|
5712
6152
|
profile.language = g_param[OptionsDefine.Language]
|
|
5713
6153
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5747,7 +6187,10 @@ def doAddClusterSlaveZone(args, parsed_globals):
|
|
|
5747
6187
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5748
6188
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5749
6189
|
)
|
|
5750
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6190
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6191
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6192
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6193
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5751
6194
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5752
6195
|
else:
|
|
5753
6196
|
cred = credential.Credential(
|
|
@@ -5759,7 +6202,7 @@ def doAddClusterSlaveZone(args, parsed_globals):
|
|
|
5759
6202
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5760
6203
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5761
6204
|
)
|
|
5762
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6205
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5763
6206
|
if g_param[OptionsDefine.Language]:
|
|
5764
6207
|
profile.language = g_param[OptionsDefine.Language]
|
|
5765
6208
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5799,7 +6242,10 @@ def doModifyBackupName(args, parsed_globals):
|
|
|
5799
6242
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5800
6243
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5801
6244
|
)
|
|
5802
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6245
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6246
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6247
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6248
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5803
6249
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5804
6250
|
else:
|
|
5805
6251
|
cred = credential.Credential(
|
|
@@ -5811,7 +6257,7 @@ def doModifyBackupName(args, parsed_globals):
|
|
|
5811
6257
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5812
6258
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5813
6259
|
)
|
|
5814
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6260
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5815
6261
|
if g_param[OptionsDefine.Language]:
|
|
5816
6262
|
profile.language = g_param[OptionsDefine.Language]
|
|
5817
6263
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5851,7 +6297,10 @@ def doDescribeAccounts(args, parsed_globals):
|
|
|
5851
6297
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5852
6298
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5853
6299
|
)
|
|
5854
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6300
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6301
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6302
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6303
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5855
6304
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5856
6305
|
else:
|
|
5857
6306
|
cred = credential.Credential(
|
|
@@ -5863,7 +6312,7 @@ def doDescribeAccounts(args, parsed_globals):
|
|
|
5863
6312
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5864
6313
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5865
6314
|
)
|
|
5866
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6315
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5867
6316
|
if g_param[OptionsDefine.Language]:
|
|
5868
6317
|
profile.language = g_param[OptionsDefine.Language]
|
|
5869
6318
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5903,7 +6352,10 @@ def doSetRenewFlag(args, parsed_globals):
|
|
|
5903
6352
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5904
6353
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5905
6354
|
)
|
|
5906
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6355
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6356
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6357
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6358
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5907
6359
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5908
6360
|
else:
|
|
5909
6361
|
cred = credential.Credential(
|
|
@@ -5915,7 +6367,7 @@ def doSetRenewFlag(args, parsed_globals):
|
|
|
5915
6367
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5916
6368
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5917
6369
|
)
|
|
5918
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6370
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5919
6371
|
if g_param[OptionsDefine.Language]:
|
|
5920
6372
|
profile.language = g_param[OptionsDefine.Language]
|
|
5921
6373
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5955,7 +6407,10 @@ def doInquirePriceRenew(args, parsed_globals):
|
|
|
5955
6407
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5956
6408
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5957
6409
|
)
|
|
5958
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6410
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6411
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6412
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6413
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5959
6414
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5960
6415
|
else:
|
|
5961
6416
|
cred = credential.Credential(
|
|
@@ -5967,7 +6422,7 @@ def doInquirePriceRenew(args, parsed_globals):
|
|
|
5967
6422
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5968
6423
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5969
6424
|
)
|
|
5970
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6425
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5971
6426
|
if g_param[OptionsDefine.Language]:
|
|
5972
6427
|
profile.language = g_param[OptionsDefine.Language]
|
|
5973
6428
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -5997,6 +6452,61 @@ def doInquirePriceRenew(args, parsed_globals):
|
|
|
5997
6452
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5998
6453
|
|
|
5999
6454
|
|
|
6455
|
+
def doDescribeIntegrateTask(args, parsed_globals):
|
|
6456
|
+
g_param = parse_global_arg(parsed_globals)
|
|
6457
|
+
|
|
6458
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
6459
|
+
cred = credential.CVMRoleCredential()
|
|
6460
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
6461
|
+
cred = credential.STSAssumeRoleCredential(
|
|
6462
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6463
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6464
|
+
)
|
|
6465
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6466
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6467
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6468
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6469
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6470
|
+
else:
|
|
6471
|
+
cred = credential.Credential(
|
|
6472
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
6473
|
+
)
|
|
6474
|
+
http_profile = HttpProfile(
|
|
6475
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
6476
|
+
reqMethod="POST",
|
|
6477
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6478
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6479
|
+
)
|
|
6480
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6481
|
+
if g_param[OptionsDefine.Language]:
|
|
6482
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
6483
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
6484
|
+
client = mod.CynosdbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
6485
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
6486
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
6487
|
+
model = models.DescribeIntegrateTaskRequest()
|
|
6488
|
+
model.from_json_string(json.dumps(args))
|
|
6489
|
+
start_time = time.time()
|
|
6490
|
+
while True:
|
|
6491
|
+
rsp = client.DescribeIntegrateTask(model)
|
|
6492
|
+
result = rsp.to_json_string()
|
|
6493
|
+
try:
|
|
6494
|
+
json_obj = json.loads(result)
|
|
6495
|
+
except TypeError as e:
|
|
6496
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
6497
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
6498
|
+
break
|
|
6499
|
+
cur_time = time.time()
|
|
6500
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
6501
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
6502
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
6503
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
6504
|
+
else:
|
|
6505
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
6506
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
6507
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6508
|
+
|
|
6509
|
+
|
|
6000
6510
|
def doStartCLSDelivery(args, parsed_globals):
|
|
6001
6511
|
g_param = parse_global_arg(parsed_globals)
|
|
6002
6512
|
|
|
@@ -6007,7 +6517,10 @@ def doStartCLSDelivery(args, parsed_globals):
|
|
|
6007
6517
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6008
6518
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6009
6519
|
)
|
|
6010
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6520
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6521
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6522
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6523
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6011
6524
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6012
6525
|
else:
|
|
6013
6526
|
cred = credential.Credential(
|
|
@@ -6019,7 +6532,7 @@ def doStartCLSDelivery(args, parsed_globals):
|
|
|
6019
6532
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6020
6533
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6021
6534
|
)
|
|
6022
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6535
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6023
6536
|
if g_param[OptionsDefine.Language]:
|
|
6024
6537
|
profile.language = g_param[OptionsDefine.Language]
|
|
6025
6538
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6059,7 +6572,10 @@ def doReloadBalanceProxyNode(args, parsed_globals):
|
|
|
6059
6572
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6060
6573
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6061
6574
|
)
|
|
6062
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6575
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6576
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6577
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6578
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6063
6579
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6064
6580
|
else:
|
|
6065
6581
|
cred = credential.Credential(
|
|
@@ -6071,7 +6587,7 @@ def doReloadBalanceProxyNode(args, parsed_globals):
|
|
|
6071
6587
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6072
6588
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6073
6589
|
)
|
|
6074
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6590
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6075
6591
|
if g_param[OptionsDefine.Language]:
|
|
6076
6592
|
profile.language = g_param[OptionsDefine.Language]
|
|
6077
6593
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6111,7 +6627,10 @@ def doDescribeBackupDownloadRestriction(args, parsed_globals):
|
|
|
6111
6627
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6112
6628
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6113
6629
|
)
|
|
6114
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6630
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6631
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6632
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6633
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6115
6634
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6116
6635
|
else:
|
|
6117
6636
|
cred = credential.Credential(
|
|
@@ -6123,7 +6642,7 @@ def doDescribeBackupDownloadRestriction(args, parsed_globals):
|
|
|
6123
6642
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6124
6643
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6125
6644
|
)
|
|
6126
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6645
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6127
6646
|
if g_param[OptionsDefine.Language]:
|
|
6128
6647
|
profile.language = g_param[OptionsDefine.Language]
|
|
6129
6648
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6153,7 +6672,7 @@ def doDescribeBackupDownloadRestriction(args, parsed_globals):
|
|
|
6153
6672
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6154
6673
|
|
|
6155
6674
|
|
|
6156
|
-
def
|
|
6675
|
+
def doUpgradeProxyVersion(args, parsed_globals):
|
|
6157
6676
|
g_param = parse_global_arg(parsed_globals)
|
|
6158
6677
|
|
|
6159
6678
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -6163,7 +6682,10 @@ def doDescribeIsolatedInstances(args, parsed_globals):
|
|
|
6163
6682
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6164
6683
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6165
6684
|
)
|
|
6166
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6685
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6686
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6687
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6688
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6167
6689
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6168
6690
|
else:
|
|
6169
6691
|
cred = credential.Credential(
|
|
@@ -6175,18 +6697,18 @@ def doDescribeIsolatedInstances(args, parsed_globals):
|
|
|
6175
6697
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6176
6698
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6177
6699
|
)
|
|
6178
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6700
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6179
6701
|
if g_param[OptionsDefine.Language]:
|
|
6180
6702
|
profile.language = g_param[OptionsDefine.Language]
|
|
6181
6703
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
6182
6704
|
client = mod.CynosdbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
6183
6705
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
6184
6706
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
6185
|
-
model = models.
|
|
6707
|
+
model = models.UpgradeProxyVersionRequest()
|
|
6186
6708
|
model.from_json_string(json.dumps(args))
|
|
6187
6709
|
start_time = time.time()
|
|
6188
6710
|
while True:
|
|
6189
|
-
rsp = client.
|
|
6711
|
+
rsp = client.UpgradeProxyVersion(model)
|
|
6190
6712
|
result = rsp.to_json_string()
|
|
6191
6713
|
try:
|
|
6192
6714
|
json_obj = json.loads(result)
|
|
@@ -6215,7 +6737,10 @@ def doModifyAuditRuleTemplates(args, parsed_globals):
|
|
|
6215
6737
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6216
6738
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6217
6739
|
)
|
|
6218
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6740
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6741
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6742
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6743
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6219
6744
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6220
6745
|
else:
|
|
6221
6746
|
cred = credential.Credential(
|
|
@@ -6227,7 +6752,7 @@ def doModifyAuditRuleTemplates(args, parsed_globals):
|
|
|
6227
6752
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6228
6753
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6229
6754
|
)
|
|
6230
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6755
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6231
6756
|
if g_param[OptionsDefine.Language]:
|
|
6232
6757
|
profile.language = g_param[OptionsDefine.Language]
|
|
6233
6758
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6267,7 +6792,10 @@ def doStopCLSDelivery(args, parsed_globals):
|
|
|
6267
6792
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6268
6793
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6269
6794
|
)
|
|
6270
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6795
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6796
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6797
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6798
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6271
6799
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6272
6800
|
else:
|
|
6273
6801
|
cred = credential.Credential(
|
|
@@ -6279,7 +6807,7 @@ def doStopCLSDelivery(args, parsed_globals):
|
|
|
6279
6807
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6280
6808
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6281
6809
|
)
|
|
6282
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6810
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6283
6811
|
if g_param[OptionsDefine.Language]:
|
|
6284
6812
|
profile.language = g_param[OptionsDefine.Language]
|
|
6285
6813
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6319,7 +6847,10 @@ def doOpenReadOnlyInstanceExclusiveAccess(args, parsed_globals):
|
|
|
6319
6847
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6320
6848
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6321
6849
|
)
|
|
6322
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6850
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6851
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6852
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6853
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6323
6854
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6324
6855
|
else:
|
|
6325
6856
|
cred = credential.Credential(
|
|
@@ -6331,7 +6862,7 @@ def doOpenReadOnlyInstanceExclusiveAccess(args, parsed_globals):
|
|
|
6331
6862
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6332
6863
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6333
6864
|
)
|
|
6334
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6865
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6335
6866
|
if g_param[OptionsDefine.Language]:
|
|
6336
6867
|
profile.language = g_param[OptionsDefine.Language]
|
|
6337
6868
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6371,7 +6902,10 @@ def doDescribeBackupList(args, parsed_globals):
|
|
|
6371
6902
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6372
6903
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6373
6904
|
)
|
|
6374
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6905
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6906
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6907
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6908
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6375
6909
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6376
6910
|
else:
|
|
6377
6911
|
cred = credential.Credential(
|
|
@@ -6383,7 +6917,7 @@ def doDescribeBackupList(args, parsed_globals):
|
|
|
6383
6917
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6384
6918
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6385
6919
|
)
|
|
6386
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6920
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6387
6921
|
if g_param[OptionsDefine.Language]:
|
|
6388
6922
|
profile.language = g_param[OptionsDefine.Language]
|
|
6389
6923
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6423,7 +6957,10 @@ def doModifyAccountDescription(args, parsed_globals):
|
|
|
6423
6957
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6424
6958
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6425
6959
|
)
|
|
6426
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
6960
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
6961
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
6962
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
6963
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6427
6964
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6428
6965
|
else:
|
|
6429
6966
|
cred = credential.Credential(
|
|
@@ -6435,7 +6972,7 @@ def doModifyAccountDescription(args, parsed_globals):
|
|
|
6435
6972
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6436
6973
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6437
6974
|
)
|
|
6438
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
6975
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6439
6976
|
if g_param[OptionsDefine.Language]:
|
|
6440
6977
|
profile.language = g_param[OptionsDefine.Language]
|
|
6441
6978
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6475,7 +7012,10 @@ def doRenewClusters(args, parsed_globals):
|
|
|
6475
7012
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6476
7013
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6477
7014
|
)
|
|
6478
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7015
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7016
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7017
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7018
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6479
7019
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6480
7020
|
else:
|
|
6481
7021
|
cred = credential.Credential(
|
|
@@ -6487,7 +7027,7 @@ def doRenewClusters(args, parsed_globals):
|
|
|
6487
7027
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6488
7028
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6489
7029
|
)
|
|
6490
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7030
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6491
7031
|
if g_param[OptionsDefine.Language]:
|
|
6492
7032
|
profile.language = g_param[OptionsDefine.Language]
|
|
6493
7033
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6527,7 +7067,10 @@ def doCreateClusterDatabase(args, parsed_globals):
|
|
|
6527
7067
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6528
7068
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6529
7069
|
)
|
|
6530
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7070
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7071
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7072
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7073
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6531
7074
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6532
7075
|
else:
|
|
6533
7076
|
cred = credential.Credential(
|
|
@@ -6539,7 +7082,7 @@ def doCreateClusterDatabase(args, parsed_globals):
|
|
|
6539
7082
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6540
7083
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6541
7084
|
)
|
|
6542
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7085
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6543
7086
|
if g_param[OptionsDefine.Language]:
|
|
6544
7087
|
profile.language = g_param[OptionsDefine.Language]
|
|
6545
7088
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6579,7 +7122,10 @@ def doModifyResourcePackageName(args, parsed_globals):
|
|
|
6579
7122
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6580
7123
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6581
7124
|
)
|
|
6582
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7125
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7126
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7127
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7128
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6583
7129
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6584
7130
|
else:
|
|
6585
7131
|
cred = credential.Credential(
|
|
@@ -6591,7 +7137,7 @@ def doModifyResourcePackageName(args, parsed_globals):
|
|
|
6591
7137
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6592
7138
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6593
7139
|
)
|
|
6594
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7140
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6595
7141
|
if g_param[OptionsDefine.Language]:
|
|
6596
7142
|
profile.language = g_param[OptionsDefine.Language]
|
|
6597
7143
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6631,7 +7177,10 @@ def doModifyClusterReadOnly(args, parsed_globals):
|
|
|
6631
7177
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6632
7178
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6633
7179
|
)
|
|
6634
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7180
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7181
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7182
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7183
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6635
7184
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6636
7185
|
else:
|
|
6637
7186
|
cred = credential.Credential(
|
|
@@ -6643,7 +7192,7 @@ def doModifyClusterReadOnly(args, parsed_globals):
|
|
|
6643
7192
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6644
7193
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6645
7194
|
)
|
|
6646
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7195
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6647
7196
|
if g_param[OptionsDefine.Language]:
|
|
6648
7197
|
profile.language = g_param[OptionsDefine.Language]
|
|
6649
7198
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6683,7 +7232,10 @@ def doDeleteAuditLogFile(args, parsed_globals):
|
|
|
6683
7232
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6684
7233
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6685
7234
|
)
|
|
6686
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7235
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7236
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7237
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7238
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6687
7239
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6688
7240
|
else:
|
|
6689
7241
|
cred = credential.Credential(
|
|
@@ -6695,7 +7247,7 @@ def doDeleteAuditLogFile(args, parsed_globals):
|
|
|
6695
7247
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6696
7248
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6697
7249
|
)
|
|
6698
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7250
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6699
7251
|
if g_param[OptionsDefine.Language]:
|
|
6700
7252
|
profile.language = g_param[OptionsDefine.Language]
|
|
6701
7253
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6735,7 +7287,10 @@ def doDescribeAuditRuleTemplates(args, parsed_globals):
|
|
|
6735
7287
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6736
7288
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6737
7289
|
)
|
|
6738
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7290
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7291
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7292
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7293
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6739
7294
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6740
7295
|
else:
|
|
6741
7296
|
cred = credential.Credential(
|
|
@@ -6747,7 +7302,7 @@ def doDescribeAuditRuleTemplates(args, parsed_globals):
|
|
|
6747
7302
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6748
7303
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6749
7304
|
)
|
|
6750
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7305
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6751
7306
|
if g_param[OptionsDefine.Language]:
|
|
6752
7307
|
profile.language = g_param[OptionsDefine.Language]
|
|
6753
7308
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6787,7 +7342,10 @@ def doDescribeResourcePackageDetail(args, parsed_globals):
|
|
|
6787
7342
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6788
7343
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6789
7344
|
)
|
|
6790
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7345
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7346
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7347
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7348
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6791
7349
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6792
7350
|
else:
|
|
6793
7351
|
cred = credential.Credential(
|
|
@@ -6799,7 +7357,7 @@ def doDescribeResourcePackageDetail(args, parsed_globals):
|
|
|
6799
7357
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6800
7358
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6801
7359
|
)
|
|
6802
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7360
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6803
7361
|
if g_param[OptionsDefine.Language]:
|
|
6804
7362
|
profile.language = g_param[OptionsDefine.Language]
|
|
6805
7363
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6839,7 +7397,10 @@ def doModifyBackupConfig(args, parsed_globals):
|
|
|
6839
7397
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6840
7398
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6841
7399
|
)
|
|
6842
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7400
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7401
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7402
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7403
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6843
7404
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6844
7405
|
else:
|
|
6845
7406
|
cred = credential.Credential(
|
|
@@ -6851,7 +7412,7 @@ def doModifyBackupConfig(args, parsed_globals):
|
|
|
6851
7412
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6852
7413
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6853
7414
|
)
|
|
6854
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7415
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6855
7416
|
if g_param[OptionsDefine.Language]:
|
|
6856
7417
|
profile.language = g_param[OptionsDefine.Language]
|
|
6857
7418
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6891,7 +7452,10 @@ def doOfflineCluster(args, parsed_globals):
|
|
|
6891
7452
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6892
7453
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6893
7454
|
)
|
|
6894
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7455
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7456
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7457
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7458
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6895
7459
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6896
7460
|
else:
|
|
6897
7461
|
cred = credential.Credential(
|
|
@@ -6903,7 +7467,7 @@ def doOfflineCluster(args, parsed_globals):
|
|
|
6903
7467
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6904
7468
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6905
7469
|
)
|
|
6906
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7470
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6907
7471
|
if g_param[OptionsDefine.Language]:
|
|
6908
7472
|
profile.language = g_param[OptionsDefine.Language]
|
|
6909
7473
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6943,7 +7507,10 @@ def doDescribeClusterReadOnly(args, parsed_globals):
|
|
|
6943
7507
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6944
7508
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6945
7509
|
)
|
|
6946
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7510
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7511
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7512
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7513
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6947
7514
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6948
7515
|
else:
|
|
6949
7516
|
cred = credential.Credential(
|
|
@@ -6955,7 +7522,7 @@ def doDescribeClusterReadOnly(args, parsed_globals):
|
|
|
6955
7522
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6956
7523
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6957
7524
|
)
|
|
6958
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7525
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
6959
7526
|
if g_param[OptionsDefine.Language]:
|
|
6960
7527
|
profile.language = g_param[OptionsDefine.Language]
|
|
6961
7528
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -6995,7 +7562,10 @@ def doUpgradeClusterVersion(args, parsed_globals):
|
|
|
6995
7562
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6996
7563
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6997
7564
|
)
|
|
6998
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7565
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7566
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7567
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7568
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6999
7569
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7000
7570
|
else:
|
|
7001
7571
|
cred = credential.Credential(
|
|
@@ -7007,7 +7577,7 @@ def doUpgradeClusterVersion(args, parsed_globals):
|
|
|
7007
7577
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7008
7578
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7009
7579
|
)
|
|
7010
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7580
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7011
7581
|
if g_param[OptionsDefine.Language]:
|
|
7012
7582
|
profile.language = g_param[OptionsDefine.Language]
|
|
7013
7583
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7047,7 +7617,10 @@ def doOpenSSL(args, parsed_globals):
|
|
|
7047
7617
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7048
7618
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7049
7619
|
)
|
|
7050
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7620
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7621
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7622
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7623
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7051
7624
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7052
7625
|
else:
|
|
7053
7626
|
cred = credential.Credential(
|
|
@@ -7059,7 +7632,7 @@ def doOpenSSL(args, parsed_globals):
|
|
|
7059
7632
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7060
7633
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7061
7634
|
)
|
|
7062
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7635
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7063
7636
|
if g_param[OptionsDefine.Language]:
|
|
7064
7637
|
profile.language = g_param[OptionsDefine.Language]
|
|
7065
7638
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7099,7 +7672,10 @@ def doSearchClusterDatabases(args, parsed_globals):
|
|
|
7099
7672
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7100
7673
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7101
7674
|
)
|
|
7102
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7675
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7676
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7677
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7678
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7103
7679
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7104
7680
|
else:
|
|
7105
7681
|
cred = credential.Credential(
|
|
@@ -7111,7 +7687,7 @@ def doSearchClusterDatabases(args, parsed_globals):
|
|
|
7111
7687
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7112
7688
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7113
7689
|
)
|
|
7114
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7690
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7115
7691
|
if g_param[OptionsDefine.Language]:
|
|
7116
7692
|
profile.language = g_param[OptionsDefine.Language]
|
|
7117
7693
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7151,7 +7727,10 @@ def doDescribeClusterParams(args, parsed_globals):
|
|
|
7151
7727
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7152
7728
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7153
7729
|
)
|
|
7154
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7730
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7731
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7732
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7733
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7155
7734
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7156
7735
|
else:
|
|
7157
7736
|
cred = credential.Credential(
|
|
@@ -7163,7 +7742,7 @@ def doDescribeClusterParams(args, parsed_globals):
|
|
|
7163
7742
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7164
7743
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7165
7744
|
)
|
|
7166
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7745
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7167
7746
|
if g_param[OptionsDefine.Language]:
|
|
7168
7747
|
profile.language = g_param[OptionsDefine.Language]
|
|
7169
7748
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7203,7 +7782,10 @@ def doRefundResourcePackage(args, parsed_globals):
|
|
|
7203
7782
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7204
7783
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7205
7784
|
)
|
|
7206
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7785
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7786
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7787
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7788
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7207
7789
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7208
7790
|
else:
|
|
7209
7791
|
cred = credential.Credential(
|
|
@@ -7215,7 +7797,7 @@ def doRefundResourcePackage(args, parsed_globals):
|
|
|
7215
7797
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7216
7798
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7217
7799
|
)
|
|
7218
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7800
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7219
7801
|
if g_param[OptionsDefine.Language]:
|
|
7220
7802
|
profile.language = g_param[OptionsDefine.Language]
|
|
7221
7803
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7255,7 +7837,10 @@ def doModifyInstanceName(args, parsed_globals):
|
|
|
7255
7837
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7256
7838
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7257
7839
|
)
|
|
7258
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7840
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7841
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7842
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7843
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7259
7844
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7260
7845
|
else:
|
|
7261
7846
|
cred = credential.Credential(
|
|
@@ -7267,7 +7852,7 @@ def doModifyInstanceName(args, parsed_globals):
|
|
|
7267
7852
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7268
7853
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7269
7854
|
)
|
|
7270
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7855
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7271
7856
|
if g_param[OptionsDefine.Language]:
|
|
7272
7857
|
profile.language = g_param[OptionsDefine.Language]
|
|
7273
7858
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7307,7 +7892,10 @@ def doDescribeMaintainPeriod(args, parsed_globals):
|
|
|
7307
7892
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7308
7893
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7309
7894
|
)
|
|
7310
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7895
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7896
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7897
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7898
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7311
7899
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7312
7900
|
else:
|
|
7313
7901
|
cred = credential.Credential(
|
|
@@ -7319,7 +7907,7 @@ def doDescribeMaintainPeriod(args, parsed_globals):
|
|
|
7319
7907
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7320
7908
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7321
7909
|
)
|
|
7322
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7910
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7323
7911
|
if g_param[OptionsDefine.Language]:
|
|
7324
7912
|
profile.language = g_param[OptionsDefine.Language]
|
|
7325
7913
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7359,7 +7947,10 @@ def doSwitchProxyVpc(args, parsed_globals):
|
|
|
7359
7947
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7360
7948
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7361
7949
|
)
|
|
7362
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
7950
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
7951
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
7952
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
7953
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7363
7954
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7364
7955
|
else:
|
|
7365
7956
|
cred = credential.Credential(
|
|
@@ -7371,7 +7962,7 @@ def doSwitchProxyVpc(args, parsed_globals):
|
|
|
7371
7962
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7372
7963
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7373
7964
|
)
|
|
7374
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
7965
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7375
7966
|
if g_param[OptionsDefine.Language]:
|
|
7376
7967
|
profile.language = g_param[OptionsDefine.Language]
|
|
7377
7968
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7411,7 +8002,10 @@ def doDescribeClusterDetailDatabases(args, parsed_globals):
|
|
|
7411
8002
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7412
8003
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7413
8004
|
)
|
|
7414
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8005
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8006
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8007
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8008
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7415
8009
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7416
8010
|
else:
|
|
7417
8011
|
cred = credential.Credential(
|
|
@@ -7423,7 +8017,7 @@ def doDescribeClusterDetailDatabases(args, parsed_globals):
|
|
|
7423
8017
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7424
8018
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7425
8019
|
)
|
|
7426
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8020
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7427
8021
|
if g_param[OptionsDefine.Language]:
|
|
7428
8022
|
profile.language = g_param[OptionsDefine.Language]
|
|
7429
8023
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7463,7 +8057,10 @@ def doModifyServerlessStrategy(args, parsed_globals):
|
|
|
7463
8057
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7464
8058
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7465
8059
|
)
|
|
7466
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8060
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8061
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8062
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8063
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7467
8064
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7468
8065
|
else:
|
|
7469
8066
|
cred = credential.Credential(
|
|
@@ -7475,7 +8072,7 @@ def doModifyServerlessStrategy(args, parsed_globals):
|
|
|
7475
8072
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7476
8073
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7477
8074
|
)
|
|
7478
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8075
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7479
8076
|
if g_param[OptionsDefine.Language]:
|
|
7480
8077
|
profile.language = g_param[OptionsDefine.Language]
|
|
7481
8078
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7515,7 +8112,10 @@ def doDescribeZones(args, parsed_globals):
|
|
|
7515
8112
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7516
8113
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7517
8114
|
)
|
|
7518
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8115
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8116
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8117
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8118
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7519
8119
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7520
8120
|
else:
|
|
7521
8121
|
cred = credential.Credential(
|
|
@@ -7527,7 +8127,7 @@ def doDescribeZones(args, parsed_globals):
|
|
|
7527
8127
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7528
8128
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7529
8129
|
)
|
|
7530
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8130
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7531
8131
|
if g_param[OptionsDefine.Language]:
|
|
7532
8132
|
profile.language = g_param[OptionsDefine.Language]
|
|
7533
8133
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7567,7 +8167,10 @@ def doDescribeBackupDownloadUrl(args, parsed_globals):
|
|
|
7567
8167
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7568
8168
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7569
8169
|
)
|
|
7570
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8170
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8171
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8172
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8173
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7571
8174
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7572
8175
|
else:
|
|
7573
8176
|
cred = credential.Credential(
|
|
@@ -7579,7 +8182,7 @@ def doDescribeBackupDownloadUrl(args, parsed_globals):
|
|
|
7579
8182
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7580
8183
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7581
8184
|
)
|
|
7582
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8185
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7583
8186
|
if g_param[OptionsDefine.Language]:
|
|
7584
8187
|
profile.language = g_param[OptionsDefine.Language]
|
|
7585
8188
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7619,7 +8222,10 @@ def doSwitchClusterVpc(args, parsed_globals):
|
|
|
7619
8222
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7620
8223
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7621
8224
|
)
|
|
7622
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8225
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8226
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8227
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8228
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7623
8229
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7624
8230
|
else:
|
|
7625
8231
|
cred = credential.Credential(
|
|
@@ -7631,7 +8237,7 @@ def doSwitchClusterVpc(args, parsed_globals):
|
|
|
7631
8237
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7632
8238
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7633
8239
|
)
|
|
7634
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8240
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7635
8241
|
if g_param[OptionsDefine.Language]:
|
|
7636
8242
|
profile.language = g_param[OptionsDefine.Language]
|
|
7637
8243
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7671,7 +8277,10 @@ def doCreateProxy(args, parsed_globals):
|
|
|
7671
8277
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7672
8278
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7673
8279
|
)
|
|
7674
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8280
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8281
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8282
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8283
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7675
8284
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7676
8285
|
else:
|
|
7677
8286
|
cred = credential.Credential(
|
|
@@ -7683,7 +8292,7 @@ def doCreateProxy(args, parsed_globals):
|
|
|
7683
8292
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7684
8293
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7685
8294
|
)
|
|
7686
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8295
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7687
8296
|
if g_param[OptionsDefine.Language]:
|
|
7688
8297
|
profile.language = g_param[OptionsDefine.Language]
|
|
7689
8298
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7723,7 +8332,10 @@ def doDescribeClusterDetail(args, parsed_globals):
|
|
|
7723
8332
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7724
8333
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7725
8334
|
)
|
|
7726
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8335
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8336
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8337
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8338
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7727
8339
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7728
8340
|
else:
|
|
7729
8341
|
cred = credential.Credential(
|
|
@@ -7735,7 +8347,7 @@ def doDescribeClusterDetail(args, parsed_globals):
|
|
|
7735
8347
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7736
8348
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7737
8349
|
)
|
|
7738
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8350
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7739
8351
|
if g_param[OptionsDefine.Language]:
|
|
7740
8352
|
profile.language = g_param[OptionsDefine.Language]
|
|
7741
8353
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7775,7 +8387,10 @@ def doCreateCLSDelivery(args, parsed_globals):
|
|
|
7775
8387
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7776
8388
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7777
8389
|
)
|
|
7778
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8390
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8391
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8392
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8393
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7779
8394
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7780
8395
|
else:
|
|
7781
8396
|
cred = credential.Credential(
|
|
@@ -7787,7 +8402,7 @@ def doCreateCLSDelivery(args, parsed_globals):
|
|
|
7787
8402
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7788
8403
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7789
8404
|
)
|
|
7790
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8405
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7791
8406
|
if g_param[OptionsDefine.Language]:
|
|
7792
8407
|
profile.language = g_param[OptionsDefine.Language]
|
|
7793
8408
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7827,7 +8442,10 @@ def doModifyBinlogSaveDays(args, parsed_globals):
|
|
|
7827
8442
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7828
8443
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7829
8444
|
)
|
|
7830
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8445
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8446
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8447
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8448
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7831
8449
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7832
8450
|
else:
|
|
7833
8451
|
cred = credential.Credential(
|
|
@@ -7839,7 +8457,7 @@ def doModifyBinlogSaveDays(args, parsed_globals):
|
|
|
7839
8457
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7840
8458
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7841
8459
|
)
|
|
7842
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8460
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7843
8461
|
if g_param[OptionsDefine.Language]:
|
|
7844
8462
|
profile.language = g_param[OptionsDefine.Language]
|
|
7845
8463
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7879,7 +8497,10 @@ def doDescribeAccountAllGrantPrivileges(args, parsed_globals):
|
|
|
7879
8497
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7880
8498
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7881
8499
|
)
|
|
7882
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8500
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8501
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8502
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8503
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7883
8504
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7884
8505
|
else:
|
|
7885
8506
|
cred = credential.Credential(
|
|
@@ -7891,7 +8512,7 @@ def doDescribeAccountAllGrantPrivileges(args, parsed_globals):
|
|
|
7891
8512
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7892
8513
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7893
8514
|
)
|
|
7894
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8515
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7895
8516
|
if g_param[OptionsDefine.Language]:
|
|
7896
8517
|
profile.language = g_param[OptionsDefine.Language]
|
|
7897
8518
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7931,7 +8552,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
7931
8552
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7932
8553
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7933
8554
|
)
|
|
7934
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8555
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8556
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8557
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8558
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7935
8559
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7936
8560
|
else:
|
|
7937
8561
|
cred = credential.Credential(
|
|
@@ -7943,7 +8567,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
7943
8567
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7944
8568
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7945
8569
|
)
|
|
7946
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8570
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7947
8571
|
if g_param[OptionsDefine.Language]:
|
|
7948
8572
|
profile.language = g_param[OptionsDefine.Language]
|
|
7949
8573
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -7983,7 +8607,10 @@ def doDescribeClusterPasswordComplexity(args, parsed_globals):
|
|
|
7983
8607
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
7984
8608
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
7985
8609
|
)
|
|
7986
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8610
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8611
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8612
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8613
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
7987
8614
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
7988
8615
|
else:
|
|
7989
8616
|
cred = credential.Credential(
|
|
@@ -7995,7 +8622,7 @@ def doDescribeClusterPasswordComplexity(args, parsed_globals):
|
|
|
7995
8622
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
7996
8623
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
7997
8624
|
)
|
|
7998
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8625
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
7999
8626
|
if g_param[OptionsDefine.Language]:
|
|
8000
8627
|
profile.language = g_param[OptionsDefine.Language]
|
|
8001
8628
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8035,7 +8662,10 @@ def doDeleteParamTemplate(args, parsed_globals):
|
|
|
8035
8662
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8036
8663
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8037
8664
|
)
|
|
8038
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8665
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8666
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8667
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8668
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8039
8669
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8040
8670
|
else:
|
|
8041
8671
|
cred = credential.Credential(
|
|
@@ -8047,7 +8677,7 @@ def doDeleteParamTemplate(args, parsed_globals):
|
|
|
8047
8677
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8048
8678
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8049
8679
|
)
|
|
8050
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8680
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8051
8681
|
if g_param[OptionsDefine.Language]:
|
|
8052
8682
|
profile.language = g_param[OptionsDefine.Language]
|
|
8053
8683
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8087,7 +8717,10 @@ def doUpgradeInstance(args, parsed_globals):
|
|
|
8087
8717
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8088
8718
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8089
8719
|
)
|
|
8090
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8720
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8721
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8722
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8723
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8091
8724
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8092
8725
|
else:
|
|
8093
8726
|
cred = credential.Credential(
|
|
@@ -8099,7 +8732,7 @@ def doUpgradeInstance(args, parsed_globals):
|
|
|
8099
8732
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8100
8733
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8101
8734
|
)
|
|
8102
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8735
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8103
8736
|
if g_param[OptionsDefine.Language]:
|
|
8104
8737
|
profile.language = g_param[OptionsDefine.Language]
|
|
8105
8738
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8139,7 +8772,10 @@ def doDescribeBinlogs(args, parsed_globals):
|
|
|
8139
8772
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8140
8773
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8141
8774
|
)
|
|
8142
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8775
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8776
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8777
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8778
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8143
8779
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8144
8780
|
else:
|
|
8145
8781
|
cred = credential.Credential(
|
|
@@ -8151,7 +8787,7 @@ def doDescribeBinlogs(args, parsed_globals):
|
|
|
8151
8787
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8152
8788
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8153
8789
|
)
|
|
8154
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8790
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8155
8791
|
if g_param[OptionsDefine.Language]:
|
|
8156
8792
|
profile.language = g_param[OptionsDefine.Language]
|
|
8157
8793
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8191,7 +8827,10 @@ def doDescribeClusterInstanceGroups(args, parsed_globals):
|
|
|
8191
8827
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8192
8828
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8193
8829
|
)
|
|
8194
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8830
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8831
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8832
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8833
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8195
8834
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8196
8835
|
else:
|
|
8197
8836
|
cred = credential.Credential(
|
|
@@ -8203,7 +8842,7 @@ def doDescribeClusterInstanceGroups(args, parsed_globals):
|
|
|
8203
8842
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8204
8843
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8205
8844
|
)
|
|
8206
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8845
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8207
8846
|
if g_param[OptionsDefine.Language]:
|
|
8208
8847
|
profile.language = g_param[OptionsDefine.Language]
|
|
8209
8848
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8243,7 +8882,10 @@ def doDescribeDBSecurityGroups(args, parsed_globals):
|
|
|
8243
8882
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8244
8883
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8245
8884
|
)
|
|
8246
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8885
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8886
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8887
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8888
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8247
8889
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8248
8890
|
else:
|
|
8249
8891
|
cred = credential.Credential(
|
|
@@ -8255,7 +8897,7 @@ def doDescribeDBSecurityGroups(args, parsed_globals):
|
|
|
8255
8897
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8256
8898
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8257
8899
|
)
|
|
8258
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8900
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8259
8901
|
if g_param[OptionsDefine.Language]:
|
|
8260
8902
|
profile.language = g_param[OptionsDefine.Language]
|
|
8261
8903
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8295,7 +8937,10 @@ def doOpenClusterPasswordComplexity(args, parsed_globals):
|
|
|
8295
8937
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8296
8938
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8297
8939
|
)
|
|
8298
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8940
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8941
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8942
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8943
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8299
8944
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8300
8945
|
else:
|
|
8301
8946
|
cred = credential.Credential(
|
|
@@ -8307,7 +8952,7 @@ def doOpenClusterPasswordComplexity(args, parsed_globals):
|
|
|
8307
8952
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8308
8953
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8309
8954
|
)
|
|
8310
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
8955
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8311
8956
|
if g_param[OptionsDefine.Language]:
|
|
8312
8957
|
profile.language = g_param[OptionsDefine.Language]
|
|
8313
8958
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8347,7 +8992,10 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
8347
8992
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8348
8993
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8349
8994
|
)
|
|
8350
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
8995
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
8996
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
8997
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
8998
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8351
8999
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8352
9000
|
else:
|
|
8353
9001
|
cred = credential.Credential(
|
|
@@ -8359,7 +9007,7 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
8359
9007
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8360
9008
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8361
9009
|
)
|
|
8362
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9010
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8363
9011
|
if g_param[OptionsDefine.Language]:
|
|
8364
9012
|
profile.language = g_param[OptionsDefine.Language]
|
|
8365
9013
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8399,7 +9047,10 @@ def doRemoveClusterSlaveZone(args, parsed_globals):
|
|
|
8399
9047
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8400
9048
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8401
9049
|
)
|
|
8402
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9050
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9051
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9052
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9053
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8403
9054
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8404
9055
|
else:
|
|
8405
9056
|
cred = credential.Credential(
|
|
@@ -8411,7 +9062,7 @@ def doRemoveClusterSlaveZone(args, parsed_globals):
|
|
|
8411
9062
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8412
9063
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8413
9064
|
)
|
|
8414
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9065
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8415
9066
|
if g_param[OptionsDefine.Language]:
|
|
8416
9067
|
profile.language = g_param[OptionsDefine.Language]
|
|
8417
9068
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8451,7 +9102,10 @@ def doCloseSSL(args, parsed_globals):
|
|
|
8451
9102
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8452
9103
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8453
9104
|
)
|
|
8454
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9105
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9106
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9107
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9108
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8455
9109
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8456
9110
|
else:
|
|
8457
9111
|
cred = credential.Credential(
|
|
@@ -8463,7 +9117,7 @@ def doCloseSSL(args, parsed_globals):
|
|
|
8463
9117
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8464
9118
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8465
9119
|
)
|
|
8466
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9120
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8467
9121
|
if g_param[OptionsDefine.Language]:
|
|
8468
9122
|
profile.language = g_param[OptionsDefine.Language]
|
|
8469
9123
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8503,7 +9157,10 @@ def doDescribeInstanceErrorLogs(args, parsed_globals):
|
|
|
8503
9157
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8504
9158
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8505
9159
|
)
|
|
8506
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9160
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9161
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9162
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9163
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8507
9164
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8508
9165
|
else:
|
|
8509
9166
|
cred = credential.Credential(
|
|
@@ -8515,7 +9172,7 @@ def doDescribeInstanceErrorLogs(args, parsed_globals):
|
|
|
8515
9172
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8516
9173
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8517
9174
|
)
|
|
8518
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9175
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8519
9176
|
if g_param[OptionsDefine.Language]:
|
|
8520
9177
|
profile.language = g_param[OptionsDefine.Language]
|
|
8521
9178
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8555,7 +9212,10 @@ def doModifyBackupDownloadRestriction(args, parsed_globals):
|
|
|
8555
9212
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8556
9213
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8557
9214
|
)
|
|
8558
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9215
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9216
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9217
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9218
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8559
9219
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8560
9220
|
else:
|
|
8561
9221
|
cred = credential.Credential(
|
|
@@ -8567,7 +9227,7 @@ def doModifyBackupDownloadRestriction(args, parsed_globals):
|
|
|
8567
9227
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8568
9228
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8569
9229
|
)
|
|
8570
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9230
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8571
9231
|
if g_param[OptionsDefine.Language]:
|
|
8572
9232
|
profile.language = g_param[OptionsDefine.Language]
|
|
8573
9233
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8607,7 +9267,10 @@ def doIsolateInstance(args, parsed_globals):
|
|
|
8607
9267
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
8608
9268
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
8609
9269
|
)
|
|
8610
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
9270
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
9271
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
9272
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
9273
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
8611
9274
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
8612
9275
|
else:
|
|
8613
9276
|
cred = credential.Credential(
|
|
@@ -8619,7 +9282,7 @@ def doIsolateInstance(args, parsed_globals):
|
|
|
8619
9282
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
8620
9283
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
8621
9284
|
)
|
|
8622
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
9285
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
8623
9286
|
if g_param[OptionsDefine.Language]:
|
|
8624
9287
|
profile.language = g_param[OptionsDefine.Language]
|
|
8625
9288
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -8664,6 +9327,7 @@ ACTION_MAP = {
|
|
|
8664
9327
|
"DescribeBackupConfig": doDescribeBackupConfig,
|
|
8665
9328
|
"ReplayInstanceAuditLog": doReplayInstanceAuditLog,
|
|
8666
9329
|
"ModifyBinlogConfig": doModifyBinlogConfig,
|
|
9330
|
+
"CreateIntegrateCluster": doCreateIntegrateCluster,
|
|
8667
9331
|
"CreateProxyEndPoint": doCreateProxyEndPoint,
|
|
8668
9332
|
"ModifyResourcePackageClusters": doModifyResourcePackageClusters,
|
|
8669
9333
|
"CreateAuditRuleTemplate": doCreateAuditRuleTemplate,
|
|
@@ -8701,7 +9365,7 @@ ACTION_MAP = {
|
|
|
8701
9365
|
"RollBackCluster": doRollBackCluster,
|
|
8702
9366
|
"DescribeBinlogSaveDays": doDescribeBinlogSaveDays,
|
|
8703
9367
|
"DescribeClusterInstanceGrps": doDescribeClusterInstanceGrps,
|
|
8704
|
-
"
|
|
9368
|
+
"DescribeIsolatedInstances": doDescribeIsolatedInstances,
|
|
8705
9369
|
"ModifyClusterName": doModifyClusterName,
|
|
8706
9370
|
"ModifyProxyRwSplit": doModifyProxyRwSplit,
|
|
8707
9371
|
"ModifyVipVport": doModifyVipVport,
|
|
@@ -8717,6 +9381,7 @@ ACTION_MAP = {
|
|
|
8717
9381
|
"DescribeInstancesWithinSameCluster": doDescribeInstancesWithinSameCluster,
|
|
8718
9382
|
"RestartInstance": doRestartInstance,
|
|
8719
9383
|
"UpgradeProxy": doUpgradeProxy,
|
|
9384
|
+
"InquirePriceMultiSpec": doInquirePriceMultiSpec,
|
|
8720
9385
|
"DescribeClusters": doDescribeClusters,
|
|
8721
9386
|
"CloseWan": doCloseWan,
|
|
8722
9387
|
"DescribeProjectSecurityGroups": doDescribeProjectSecurityGroups,
|
|
@@ -8775,10 +9440,11 @@ ACTION_MAP = {
|
|
|
8775
9440
|
"DescribeAccounts": doDescribeAccounts,
|
|
8776
9441
|
"SetRenewFlag": doSetRenewFlag,
|
|
8777
9442
|
"InquirePriceRenew": doInquirePriceRenew,
|
|
9443
|
+
"DescribeIntegrateTask": doDescribeIntegrateTask,
|
|
8778
9444
|
"StartCLSDelivery": doStartCLSDelivery,
|
|
8779
9445
|
"ReloadBalanceProxyNode": doReloadBalanceProxyNode,
|
|
8780
9446
|
"DescribeBackupDownloadRestriction": doDescribeBackupDownloadRestriction,
|
|
8781
|
-
"
|
|
9447
|
+
"UpgradeProxyVersion": doUpgradeProxyVersion,
|
|
8782
9448
|
"ModifyAuditRuleTemplates": doModifyAuditRuleTemplates,
|
|
8783
9449
|
"StopCLSDelivery": doStopCLSDelivery,
|
|
8784
9450
|
"OpenReadOnlyInstanceExclusiveAccess": doOpenReadOnlyInstanceExclusiveAccess,
|