tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
|
@@ -29,7 +29,10 @@ def doDescribeDBAutonomyEvents(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -41,7 +44,7 @@ def doDescribeDBAutonomyEvents(args, parsed_globals):
|
|
|
41
44
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
42
45
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
43
46
|
)
|
|
44
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
47
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
45
48
|
if g_param[OptionsDefine.Language]:
|
|
46
49
|
profile.language = g_param[OptionsDefine.Language]
|
|
47
50
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -81,7 +84,10 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -93,7 +99,7 @@ def doOpenAuditService(args, parsed_globals):
|
|
|
93
99
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
94
100
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
95
101
|
)
|
|
96
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
102
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
97
103
|
if g_param[OptionsDefine.Language]:
|
|
98
104
|
profile.language = g_param[OptionsDefine.Language]
|
|
99
105
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -133,7 +139,10 @@ def doDescribeSecurityAuditLogDownloadUrls(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -145,7 +154,7 @@ def doDescribeSecurityAuditLogDownloadUrls(args, parsed_globals):
|
|
|
145
154
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
146
155
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
147
156
|
)
|
|
148
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
157
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
149
158
|
if g_param[OptionsDefine.Language]:
|
|
150
159
|
profile.language = g_param[OptionsDefine.Language]
|
|
151
160
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -185,7 +194,10 @@ def doDeleteDBDiagReportTasks(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -197,7 +209,7 @@ def doDeleteDBDiagReportTasks(args, parsed_globals):
|
|
|
197
209
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
198
210
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
199
211
|
)
|
|
200
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
212
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
201
213
|
if g_param[OptionsDefine.Language]:
|
|
202
214
|
profile.language = g_param[OptionsDefine.Language]
|
|
203
215
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -237,7 +249,10 @@ def doDescribeMailProfile(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -249,7 +264,7 @@ def doDescribeMailProfile(args, parsed_globals):
|
|
|
249
264
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
250
265
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
251
266
|
)
|
|
252
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
267
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
253
268
|
if g_param[OptionsDefine.Language]:
|
|
254
269
|
profile.language = g_param[OptionsDefine.Language]
|
|
255
270
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -289,7 +304,10 @@ def doCreateSchedulerMailProfile(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -301,7 +319,7 @@ def doCreateSchedulerMailProfile(args, parsed_globals):
|
|
|
301
319
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
302
320
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
303
321
|
)
|
|
304
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
322
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
305
323
|
if g_param[OptionsDefine.Language]:
|
|
306
324
|
profile.language = g_param[OptionsDefine.Language]
|
|
307
325
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -341,7 +359,10 @@ def doDescribeSqlTemplate(args, parsed_globals):
|
|
|
341
359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
361
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
367
|
else:
|
|
347
368
|
cred = credential.Credential(
|
|
@@ -353,7 +374,7 @@ def doDescribeSqlTemplate(args, parsed_globals):
|
|
|
353
374
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
354
375
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
355
376
|
)
|
|
356
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
377
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
357
378
|
if g_param[OptionsDefine.Language]:
|
|
358
379
|
profile.language = g_param[OptionsDefine.Language]
|
|
359
380
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -393,7 +414,10 @@ def doDescribeDBPerfTimeSeries(args, parsed_globals):
|
|
|
393
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
416
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
422
|
else:
|
|
399
423
|
cred = credential.Credential(
|
|
@@ -405,7 +429,7 @@ def doDescribeDBPerfTimeSeries(args, parsed_globals):
|
|
|
405
429
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
406
430
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
407
431
|
)
|
|
408
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
432
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
409
433
|
if g_param[OptionsDefine.Language]:
|
|
410
434
|
profile.language = g_param[OptionsDefine.Language]
|
|
411
435
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -445,7 +469,10 @@ def doDescribeTopSpaceSchemas(args, parsed_globals):
|
|
|
445
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
471
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
477
|
else:
|
|
451
478
|
cred = credential.Credential(
|
|
@@ -457,7 +484,7 @@ def doDescribeTopSpaceSchemas(args, parsed_globals):
|
|
|
457
484
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
458
485
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
459
486
|
)
|
|
460
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
487
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
461
488
|
if g_param[OptionsDefine.Language]:
|
|
462
489
|
profile.language = g_param[OptionsDefine.Language]
|
|
463
490
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -497,7 +524,10 @@ def doDescribeMySqlProcessList(args, parsed_globals):
|
|
|
497
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
526
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
532
|
else:
|
|
503
533
|
cred = credential.Credential(
|
|
@@ -509,7 +539,7 @@ def doDescribeMySqlProcessList(args, parsed_globals):
|
|
|
509
539
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
510
540
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
511
541
|
)
|
|
512
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
542
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
513
543
|
if g_param[OptionsDefine.Language]:
|
|
514
544
|
profile.language = g_param[OptionsDefine.Language]
|
|
515
545
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -549,7 +579,10 @@ def doDescribeIndexRecommendInfo(args, parsed_globals):
|
|
|
549
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
581
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
587
|
else:
|
|
555
588
|
cred = credential.Credential(
|
|
@@ -561,7 +594,7 @@ def doDescribeIndexRecommendInfo(args, parsed_globals):
|
|
|
561
594
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
562
595
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
563
596
|
)
|
|
564
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
597
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
565
598
|
if g_param[OptionsDefine.Language]:
|
|
566
599
|
profile.language = g_param[OptionsDefine.Language]
|
|
567
600
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -601,7 +634,10 @@ def doDescribeDBDiagReportTasks(args, parsed_globals):
|
|
|
601
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
636
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
642
|
else:
|
|
607
643
|
cred = credential.Credential(
|
|
@@ -613,7 +649,7 @@ def doDescribeDBDiagReportTasks(args, parsed_globals):
|
|
|
613
649
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
614
650
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
615
651
|
)
|
|
616
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
652
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
617
653
|
if g_param[OptionsDefine.Language]:
|
|
618
654
|
profile.language = g_param[OptionsDefine.Language]
|
|
619
655
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -653,7 +689,10 @@ def doCancelDBAutonomyEvent(args, parsed_globals):
|
|
|
653
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
691
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
697
|
else:
|
|
659
698
|
cred = credential.Credential(
|
|
@@ -665,7 +704,7 @@ def doCancelDBAutonomyEvent(args, parsed_globals):
|
|
|
665
704
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
666
705
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
667
706
|
)
|
|
668
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
707
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
669
708
|
if g_param[OptionsDefine.Language]:
|
|
670
709
|
profile.language = g_param[OptionsDefine.Language]
|
|
671
710
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -705,7 +744,10 @@ def doVerifyUserAccount(args, parsed_globals):
|
|
|
705
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
746
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
752
|
else:
|
|
711
753
|
cred = credential.Credential(
|
|
@@ -717,7 +759,7 @@ def doVerifyUserAccount(args, parsed_globals):
|
|
|
717
759
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
718
760
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
719
761
|
)
|
|
720
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
762
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
721
763
|
if g_param[OptionsDefine.Language]:
|
|
722
764
|
profile.language = g_param[OptionsDefine.Language]
|
|
723
765
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -757,7 +799,10 @@ def doDescribeAuditLogFiles(args, parsed_globals):
|
|
|
757
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
801
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
807
|
else:
|
|
763
808
|
cred = credential.Credential(
|
|
@@ -769,7 +814,7 @@ def doDescribeAuditLogFiles(args, parsed_globals):
|
|
|
769
814
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
770
815
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
771
816
|
)
|
|
772
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
817
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
773
818
|
if g_param[OptionsDefine.Language]:
|
|
774
819
|
profile.language = g_param[OptionsDefine.Language]
|
|
775
820
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -809,7 +854,10 @@ def doCreateRedisBigKeyAnalysisTask(args, parsed_globals):
|
|
|
809
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
856
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
862
|
else:
|
|
815
863
|
cred = credential.Credential(
|
|
@@ -821,7 +869,7 @@ def doCreateRedisBigKeyAnalysisTask(args, parsed_globals):
|
|
|
821
869
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
822
870
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
823
871
|
)
|
|
824
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
872
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
825
873
|
if g_param[OptionsDefine.Language]:
|
|
826
874
|
profile.language = g_param[OptionsDefine.Language]
|
|
827
875
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -861,7 +909,10 @@ def doDeleteAuditLogFile(args, parsed_globals):
|
|
|
861
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
911
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
917
|
else:
|
|
867
918
|
cred = credential.Credential(
|
|
@@ -873,7 +924,7 @@ def doDeleteAuditLogFile(args, parsed_globals):
|
|
|
873
924
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
874
925
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
875
926
|
)
|
|
876
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
877
928
|
if g_param[OptionsDefine.Language]:
|
|
878
929
|
profile.language = g_param[OptionsDefine.Language]
|
|
879
930
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -913,7 +964,10 @@ def doDescribeAllUserGroup(args, parsed_globals):
|
|
|
913
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
966
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
972
|
else:
|
|
919
973
|
cred = credential.Credential(
|
|
@@ -925,7 +979,7 @@ def doDescribeAllUserGroup(args, parsed_globals):
|
|
|
925
979
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
926
980
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
927
981
|
)
|
|
928
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
929
983
|
if g_param[OptionsDefine.Language]:
|
|
930
984
|
profile.language = g_param[OptionsDefine.Language]
|
|
931
985
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -965,7 +1019,10 @@ def doDescribeDBDiagEvents(args, parsed_globals):
|
|
|
965
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1021
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1027
|
else:
|
|
971
1028
|
cred = credential.Credential(
|
|
@@ -977,7 +1034,7 @@ def doDescribeDBDiagEvents(args, parsed_globals):
|
|
|
977
1034
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
978
1035
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
979
1036
|
)
|
|
980
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1037
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
981
1038
|
if g_param[OptionsDefine.Language]:
|
|
982
1039
|
profile.language = g_param[OptionsDefine.Language]
|
|
983
1040
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1017,7 +1074,10 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
1017
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1076
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1082
|
else:
|
|
1023
1083
|
cred = credential.Credential(
|
|
@@ -1029,7 +1089,7 @@ def doDescribeAuditInstanceList(args, parsed_globals):
|
|
|
1029
1089
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1030
1090
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1031
1091
|
)
|
|
1032
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1092
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1033
1093
|
if g_param[OptionsDefine.Language]:
|
|
1034
1094
|
profile.language = g_param[OptionsDefine.Language]
|
|
1035
1095
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1069,7 +1129,10 @@ def doDeleteRedisBigKeyAnalysisTasks(args, parsed_globals):
|
|
|
1069
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1131
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1137
|
else:
|
|
1075
1138
|
cred = credential.Credential(
|
|
@@ -1081,7 +1144,7 @@ def doDeleteRedisBigKeyAnalysisTasks(args, parsed_globals):
|
|
|
1081
1144
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1082
1145
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1083
1146
|
)
|
|
1084
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1147
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1085
1148
|
if g_param[OptionsDefine.Language]:
|
|
1086
1149
|
profile.language = g_param[OptionsDefine.Language]
|
|
1087
1150
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1111,6 +1174,61 @@ def doDeleteRedisBigKeyAnalysisTasks(args, parsed_globals):
|
|
|
1111
1174
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1112
1175
|
|
|
1113
1176
|
|
|
1177
|
+
def doDescribeMongoDBProcessList(args, parsed_globals):
|
|
1178
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1179
|
+
|
|
1180
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1181
|
+
cred = credential.CVMRoleCredential()
|
|
1182
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1183
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1184
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1185
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1186
|
+
)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1191
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1192
|
+
else:
|
|
1193
|
+
cred = credential.Credential(
|
|
1194
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1195
|
+
)
|
|
1196
|
+
http_profile = HttpProfile(
|
|
1197
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1198
|
+
reqMethod="POST",
|
|
1199
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1200
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1201
|
+
)
|
|
1202
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1203
|
+
if g_param[OptionsDefine.Language]:
|
|
1204
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1205
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1206
|
+
client = mod.DbbrainClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1207
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1208
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1209
|
+
model = models.DescribeMongoDBProcessListRequest()
|
|
1210
|
+
model.from_json_string(json.dumps(args))
|
|
1211
|
+
start_time = time.time()
|
|
1212
|
+
while True:
|
|
1213
|
+
rsp = client.DescribeMongoDBProcessList(model)
|
|
1214
|
+
result = rsp.to_json_string()
|
|
1215
|
+
try:
|
|
1216
|
+
json_obj = json.loads(result)
|
|
1217
|
+
except TypeError as e:
|
|
1218
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1219
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1220
|
+
break
|
|
1221
|
+
cur_time = time.time()
|
|
1222
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1223
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1224
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1225
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1226
|
+
else:
|
|
1227
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1228
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1229
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1230
|
+
|
|
1231
|
+
|
|
1114
1232
|
def doDescribeTopSpaceTableTimeSeries(args, parsed_globals):
|
|
1115
1233
|
g_param = parse_global_arg(parsed_globals)
|
|
1116
1234
|
|
|
@@ -1121,7 +1239,10 @@ def doDescribeTopSpaceTableTimeSeries(args, parsed_globals):
|
|
|
1121
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1241
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1247
|
else:
|
|
1127
1248
|
cred = credential.Credential(
|
|
@@ -1133,7 +1254,7 @@ def doDescribeTopSpaceTableTimeSeries(args, parsed_globals):
|
|
|
1133
1254
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1134
1255
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1135
1256
|
)
|
|
1136
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1257
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1137
1258
|
if g_param[OptionsDefine.Language]:
|
|
1138
1259
|
profile.language = g_param[OptionsDefine.Language]
|
|
1139
1260
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1173,7 +1294,10 @@ def doCreateDBDiagReportTask(args, parsed_globals):
|
|
|
1173
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1296
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1302
|
else:
|
|
1179
1303
|
cred = credential.Credential(
|
|
@@ -1185,7 +1309,7 @@ def doCreateDBDiagReportTask(args, parsed_globals):
|
|
|
1185
1309
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1186
1310
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1187
1311
|
)
|
|
1188
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1312
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1189
1313
|
if g_param[OptionsDefine.Language]:
|
|
1190
1314
|
profile.language = g_param[OptionsDefine.Language]
|
|
1191
1315
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1225,7 +1349,10 @@ def doDescribeRedisProcessList(args, parsed_globals):
|
|
|
1225
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1351
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1357
|
else:
|
|
1231
1358
|
cred = credential.Credential(
|
|
@@ -1237,7 +1364,7 @@ def doDescribeRedisProcessList(args, parsed_globals):
|
|
|
1237
1364
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1238
1365
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1239
1366
|
)
|
|
1240
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1367
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1241
1368
|
if g_param[OptionsDefine.Language]:
|
|
1242
1369
|
profile.language = g_param[OptionsDefine.Language]
|
|
1243
1370
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1277,7 +1404,10 @@ def doDescribeSlowLogUserHostStats(args, parsed_globals):
|
|
|
1277
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1406
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1412
|
else:
|
|
1283
1413
|
cred = credential.Credential(
|
|
@@ -1289,7 +1419,7 @@ def doDescribeSlowLogUserHostStats(args, parsed_globals):
|
|
|
1289
1419
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1290
1420
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1291
1421
|
)
|
|
1292
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1422
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1293
1423
|
if g_param[OptionsDefine.Language]:
|
|
1294
1424
|
profile.language = g_param[OptionsDefine.Language]
|
|
1295
1425
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1329,7 +1459,10 @@ def doDescribeRedisCmdPerfTimeSeries(args, parsed_globals):
|
|
|
1329
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1461
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1467
|
else:
|
|
1335
1468
|
cred = credential.Credential(
|
|
@@ -1341,7 +1474,7 @@ def doDescribeRedisCmdPerfTimeSeries(args, parsed_globals):
|
|
|
1341
1474
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1342
1475
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1343
1476
|
)
|
|
1344
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1477
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1345
1478
|
if g_param[OptionsDefine.Language]:
|
|
1346
1479
|
profile.language = g_param[OptionsDefine.Language]
|
|
1347
1480
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1381,7 +1514,10 @@ def doDescribeDBAutonomyAction(args, parsed_globals):
|
|
|
1381
1514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1516
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1522
|
else:
|
|
1387
1523
|
cred = credential.Credential(
|
|
@@ -1393,7 +1529,7 @@ def doDescribeDBAutonomyAction(args, parsed_globals):
|
|
|
1393
1529
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1394
1530
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1395
1531
|
)
|
|
1396
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1532
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1397
1533
|
if g_param[OptionsDefine.Language]:
|
|
1398
1534
|
profile.language = g_param[OptionsDefine.Language]
|
|
1399
1535
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1433,7 +1569,10 @@ def doDescribeDBSpaceStatus(args, parsed_globals):
|
|
|
1433
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1571
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1577
|
else:
|
|
1439
1578
|
cred = credential.Credential(
|
|
@@ -1445,7 +1584,7 @@ def doDescribeDBSpaceStatus(args, parsed_globals):
|
|
|
1445
1584
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1446
1585
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1447
1586
|
)
|
|
1448
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1587
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1449
1588
|
if g_param[OptionsDefine.Language]:
|
|
1450
1589
|
profile.language = g_param[OptionsDefine.Language]
|
|
1451
1590
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1485,7 +1624,10 @@ def doKillMySqlThreads(args, parsed_globals):
|
|
|
1485
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1626
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1632
|
else:
|
|
1491
1633
|
cred = credential.Credential(
|
|
@@ -1497,7 +1639,7 @@ def doKillMySqlThreads(args, parsed_globals):
|
|
|
1497
1639
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1498
1640
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1499
1641
|
)
|
|
1500
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1642
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1501
1643
|
if g_param[OptionsDefine.Language]:
|
|
1502
1644
|
profile.language = g_param[OptionsDefine.Language]
|
|
1503
1645
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1537,7 +1679,10 @@ def doCreateProxySessionKillTask(args, parsed_globals):
|
|
|
1537
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1681
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1687
|
else:
|
|
1543
1688
|
cred = credential.Credential(
|
|
@@ -1549,7 +1694,7 @@ def doCreateProxySessionKillTask(args, parsed_globals):
|
|
|
1549
1694
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1550
1695
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1551
1696
|
)
|
|
1552
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1697
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1553
1698
|
if g_param[OptionsDefine.Language]:
|
|
1554
1699
|
profile.language = g_param[OptionsDefine.Language]
|
|
1555
1700
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1589,7 +1734,10 @@ def doDescribeHealthScore(args, parsed_globals):
|
|
|
1589
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1736
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1742
|
else:
|
|
1595
1743
|
cred = credential.Credential(
|
|
@@ -1601,7 +1749,7 @@ def doDescribeHealthScore(args, parsed_globals):
|
|
|
1601
1749
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1602
1750
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1603
1751
|
)
|
|
1604
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1752
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1605
1753
|
if g_param[OptionsDefine.Language]:
|
|
1606
1754
|
profile.language = g_param[OptionsDefine.Language]
|
|
1607
1755
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1641,7 +1789,10 @@ def doDescribeRedisTopHotKeys(args, parsed_globals):
|
|
|
1641
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1791
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1797
|
else:
|
|
1647
1798
|
cred = credential.Credential(
|
|
@@ -1653,7 +1804,7 @@ def doDescribeRedisTopHotKeys(args, parsed_globals):
|
|
|
1653
1804
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1654
1805
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1655
1806
|
)
|
|
1656
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1807
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1657
1808
|
if g_param[OptionsDefine.Language]:
|
|
1658
1809
|
profile.language = g_param[OptionsDefine.Language]
|
|
1659
1810
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1693,7 +1844,10 @@ def doCreateSecurityAuditLogExportTask(args, parsed_globals):
|
|
|
1693
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1846
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1852
|
else:
|
|
1699
1853
|
cred = credential.Credential(
|
|
@@ -1705,7 +1859,7 @@ def doCreateSecurityAuditLogExportTask(args, parsed_globals):
|
|
|
1705
1859
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1706
1860
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1707
1861
|
)
|
|
1708
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1862
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1709
1863
|
if g_param[OptionsDefine.Language]:
|
|
1710
1864
|
profile.language = g_param[OptionsDefine.Language]
|
|
1711
1865
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1745,7 +1899,10 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
1745
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1901
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1907
|
else:
|
|
1751
1908
|
cred = credential.Credential(
|
|
@@ -1757,7 +1914,7 @@ def doCloseAuditService(args, parsed_globals):
|
|
|
1757
1914
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1758
1915
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1759
1916
|
)
|
|
1760
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1917
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1761
1918
|
if g_param[OptionsDefine.Language]:
|
|
1762
1919
|
profile.language = g_param[OptionsDefine.Language]
|
|
1763
1920
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1797,7 +1954,10 @@ def doCancelRedisBigKeyAnalysisTasks(args, parsed_globals):
|
|
|
1797
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
1956
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
1962
|
else:
|
|
1803
1963
|
cred = credential.Credential(
|
|
@@ -1809,7 +1969,7 @@ def doCancelRedisBigKeyAnalysisTasks(args, parsed_globals):
|
|
|
1809
1969
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1810
1970
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1811
1971
|
)
|
|
1812
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1972
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1813
1973
|
if g_param[OptionsDefine.Language]:
|
|
1814
1974
|
profile.language = g_param[OptionsDefine.Language]
|
|
1815
1975
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1849,7 +2009,10 @@ def doDeleteSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
1849
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
2011
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
2017
|
else:
|
|
1855
2018
|
cred = credential.Credential(
|
|
@@ -1861,7 +2024,7 @@ def doDeleteSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
1861
2024
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1862
2025
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1863
2026
|
)
|
|
1864
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2027
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1865
2028
|
if g_param[OptionsDefine.Language]:
|
|
1866
2029
|
profile.language = g_param[OptionsDefine.Language]
|
|
1867
2030
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1901,7 +2064,10 @@ def doDescribeDBAutonomyActions(args, parsed_globals):
|
|
|
1901
2064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2066
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2072
|
else:
|
|
1907
2073
|
cred = credential.Credential(
|
|
@@ -1913,7 +2079,7 @@ def doDescribeDBAutonomyActions(args, parsed_globals):
|
|
|
1913
2079
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1914
2080
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1915
2081
|
)
|
|
1916
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1917
2083
|
if g_param[OptionsDefine.Language]:
|
|
1918
2084
|
profile.language = g_param[OptionsDefine.Language]
|
|
1919
2085
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1953,7 +2119,10 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
1953
2119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1954
2120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1955
2121
|
)
|
|
1956
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1957
2126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1958
2127
|
else:
|
|
1959
2128
|
cred = credential.Credential(
|
|
@@ -1965,7 +2134,7 @@ def doModifyAuditService(args, parsed_globals):
|
|
|
1965
2134
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1966
2135
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1967
2136
|
)
|
|
1968
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2137
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1969
2138
|
if g_param[OptionsDefine.Language]:
|
|
1970
2139
|
profile.language = g_param[OptionsDefine.Language]
|
|
1971
2140
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2005,7 +2174,10 @@ def doDescribeRedisCommandCostStatistics(args, parsed_globals):
|
|
|
2005
2174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2006
2175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2007
2176
|
)
|
|
2008
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2009
2181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2010
2182
|
else:
|
|
2011
2183
|
cred = credential.Credential(
|
|
@@ -2017,7 +2189,7 @@ def doDescribeRedisCommandCostStatistics(args, parsed_globals):
|
|
|
2017
2189
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2018
2190
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2019
2191
|
)
|
|
2020
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2192
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2021
2193
|
if g_param[OptionsDefine.Language]:
|
|
2022
2194
|
profile.language = g_param[OptionsDefine.Language]
|
|
2023
2195
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2057,7 +2229,10 @@ def doDescribeRedisTopCostCommands(args, parsed_globals):
|
|
|
2057
2229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2058
2230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2059
2231
|
)
|
|
2060
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2061
2236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2062
2237
|
else:
|
|
2063
2238
|
cred = credential.Credential(
|
|
@@ -2069,7 +2244,7 @@ def doDescribeRedisTopCostCommands(args, parsed_globals):
|
|
|
2069
2244
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2070
2245
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2071
2246
|
)
|
|
2072
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2247
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2073
2248
|
if g_param[OptionsDefine.Language]:
|
|
2074
2249
|
profile.language = g_param[OptionsDefine.Language]
|
|
2075
2250
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2109,7 +2284,10 @@ def doCreateAuditLogFile(args, parsed_globals):
|
|
|
2109
2284
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2110
2285
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2111
2286
|
)
|
|
2112
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2287
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2289
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2290
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2113
2291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2114
2292
|
else:
|
|
2115
2293
|
cred = credential.Credential(
|
|
@@ -2121,7 +2299,7 @@ def doCreateAuditLogFile(args, parsed_globals):
|
|
|
2121
2299
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2122
2300
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2123
2301
|
)
|
|
2124
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2302
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2125
2303
|
if g_param[OptionsDefine.Language]:
|
|
2126
2304
|
profile.language = g_param[OptionsDefine.Language]
|
|
2127
2305
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2161,7 +2339,10 @@ def doDescribeRedisTopBigKeys(args, parsed_globals):
|
|
|
2161
2339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2162
2340
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2163
2341
|
)
|
|
2164
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2344
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2345
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2165
2346
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2166
2347
|
else:
|
|
2167
2348
|
cred = credential.Credential(
|
|
@@ -2173,7 +2354,7 @@ def doDescribeRedisTopBigKeys(args, parsed_globals):
|
|
|
2173
2354
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2174
2355
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2175
2356
|
)
|
|
2176
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2357
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2177
2358
|
if g_param[OptionsDefine.Language]:
|
|
2178
2359
|
profile.language = g_param[OptionsDefine.Language]
|
|
2179
2360
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2213,7 +2394,10 @@ def doDescribeSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
2213
2394
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2214
2395
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2215
2396
|
)
|
|
2216
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2397
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2399
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2400
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2217
2401
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2218
2402
|
else:
|
|
2219
2403
|
cred = credential.Credential(
|
|
@@ -2225,7 +2409,7 @@ def doDescribeSecurityAuditLogExportTasks(args, parsed_globals):
|
|
|
2225
2409
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2226
2410
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2227
2411
|
)
|
|
2228
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2412
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2229
2413
|
if g_param[OptionsDefine.Language]:
|
|
2230
2414
|
profile.language = g_param[OptionsDefine.Language]
|
|
2231
2415
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2265,7 +2449,10 @@ def doDescribeAllUserContact(args, parsed_globals):
|
|
|
2265
2449
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2266
2450
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2267
2451
|
)
|
|
2268
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2452
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2454
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2455
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2269
2456
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2270
2457
|
else:
|
|
2271
2458
|
cred = credential.Credential(
|
|
@@ -2277,7 +2464,7 @@ def doDescribeAllUserContact(args, parsed_globals):
|
|
|
2277
2464
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2278
2465
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2279
2466
|
)
|
|
2280
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2467
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2281
2468
|
if g_param[OptionsDefine.Language]:
|
|
2282
2469
|
profile.language = g_param[OptionsDefine.Language]
|
|
2283
2470
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2317,7 +2504,10 @@ def doDescribeRedisBigKeyAnalysisTasks(args, parsed_globals):
|
|
|
2317
2504
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2318
2505
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2319
2506
|
)
|
|
2320
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2507
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2509
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2510
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2321
2511
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2322
2512
|
else:
|
|
2323
2513
|
cred = credential.Credential(
|
|
@@ -2329,7 +2519,7 @@ def doDescribeRedisBigKeyAnalysisTasks(args, parsed_globals):
|
|
|
2329
2519
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2330
2520
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2331
2521
|
)
|
|
2332
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2522
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2333
2523
|
if g_param[OptionsDefine.Language]:
|
|
2334
2524
|
profile.language = g_param[OptionsDefine.Language]
|
|
2335
2525
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2369,7 +2559,10 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
2369
2559
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2370
2560
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2371
2561
|
)
|
|
2372
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2562
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2564
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2565
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2373
2566
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2374
2567
|
else:
|
|
2375
2568
|
cred = credential.Credential(
|
|
@@ -2381,7 +2574,7 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
2381
2574
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2382
2575
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2383
2576
|
)
|
|
2384
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2577
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2385
2578
|
if g_param[OptionsDefine.Language]:
|
|
2386
2579
|
profile.language = g_param[OptionsDefine.Language]
|
|
2387
2580
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2421,7 +2614,10 @@ def doDescribeRedisCommandOverview(args, parsed_globals):
|
|
|
2421
2614
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2422
2615
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2423
2616
|
)
|
|
2424
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2617
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2619
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2620
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2425
2621
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2426
2622
|
else:
|
|
2427
2623
|
cred = credential.Credential(
|
|
@@ -2433,7 +2629,7 @@ def doDescribeRedisCommandOverview(args, parsed_globals):
|
|
|
2433
2629
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2434
2630
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2435
2631
|
)
|
|
2436
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2632
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2437
2633
|
if g_param[OptionsDefine.Language]:
|
|
2438
2634
|
profile.language = g_param[OptionsDefine.Language]
|
|
2439
2635
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2473,7 +2669,10 @@ def doDescribeDBDiagEvent(args, parsed_globals):
|
|
|
2473
2669
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2474
2670
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2475
2671
|
)
|
|
2476
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2672
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2674
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2675
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2477
2676
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2478
2677
|
else:
|
|
2479
2678
|
cred = credential.Credential(
|
|
@@ -2485,7 +2684,7 @@ def doDescribeDBDiagEvent(args, parsed_globals):
|
|
|
2485
2684
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2486
2685
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2487
2686
|
)
|
|
2488
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2687
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2489
2688
|
if g_param[OptionsDefine.Language]:
|
|
2490
2689
|
profile.language = g_param[OptionsDefine.Language]
|
|
2491
2690
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2525,7 +2724,10 @@ def doDescribeUserAutonomyProfile(args, parsed_globals):
|
|
|
2525
2724
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2526
2725
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2527
2726
|
)
|
|
2528
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2727
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2729
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2730
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2529
2731
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2530
2732
|
else:
|
|
2531
2733
|
cred = credential.Credential(
|
|
@@ -2537,7 +2739,7 @@ def doDescribeUserAutonomyProfile(args, parsed_globals):
|
|
|
2537
2739
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2538
2740
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2539
2741
|
)
|
|
2540
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2742
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2541
2743
|
if g_param[OptionsDefine.Language]:
|
|
2542
2744
|
profile.language = g_param[OptionsDefine.Language]
|
|
2543
2745
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2577,7 +2779,10 @@ def doDescribeDBDiagHistory(args, parsed_globals):
|
|
|
2577
2779
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2578
2780
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2579
2781
|
)
|
|
2580
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2782
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2784
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2785
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2581
2786
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2582
2787
|
else:
|
|
2583
2788
|
cred = credential.Credential(
|
|
@@ -2589,7 +2794,7 @@ def doDescribeDBDiagHistory(args, parsed_globals):
|
|
|
2589
2794
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2590
2795
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2591
2796
|
)
|
|
2592
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2797
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2593
2798
|
if g_param[OptionsDefine.Language]:
|
|
2594
2799
|
profile.language = g_param[OptionsDefine.Language]
|
|
2595
2800
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2629,7 +2834,10 @@ def doDescribeRedisTopKeyPrefixList(args, parsed_globals):
|
|
|
2629
2834
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2630
2835
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2631
2836
|
)
|
|
2632
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2837
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2839
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2840
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2633
2841
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2634
2842
|
else:
|
|
2635
2843
|
cred = credential.Credential(
|
|
@@ -2641,7 +2849,7 @@ def doDescribeRedisTopKeyPrefixList(args, parsed_globals):
|
|
|
2641
2849
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2642
2850
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2643
2851
|
)
|
|
2644
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2852
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2645
2853
|
if g_param[OptionsDefine.Language]:
|
|
2646
2854
|
profile.language = g_param[OptionsDefine.Language]
|
|
2647
2855
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2681,7 +2889,10 @@ def doDescribeSlowLogTimeSeriesStats(args, parsed_globals):
|
|
|
2681
2889
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2682
2890
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2683
2891
|
)
|
|
2684
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2892
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2894
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2895
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2685
2896
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2686
2897
|
else:
|
|
2687
2898
|
cred = credential.Credential(
|
|
@@ -2693,7 +2904,7 @@ def doDescribeSlowLogTimeSeriesStats(args, parsed_globals):
|
|
|
2693
2904
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2694
2905
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2695
2906
|
)
|
|
2696
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2907
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2697
2908
|
if g_param[OptionsDefine.Language]:
|
|
2698
2909
|
profile.language = g_param[OptionsDefine.Language]
|
|
2699
2910
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2733,7 +2944,10 @@ def doDescribeTopSpaceSchemaTimeSeries(args, parsed_globals):
|
|
|
2733
2944
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2734
2945
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2735
2946
|
)
|
|
2736
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2947
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2949
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2950
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2737
2951
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2738
2952
|
else:
|
|
2739
2953
|
cred = credential.Credential(
|
|
@@ -2745,7 +2959,7 @@ def doDescribeTopSpaceSchemaTimeSeries(args, parsed_globals):
|
|
|
2745
2959
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2746
2960
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2747
2961
|
)
|
|
2748
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2962
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2749
2963
|
if g_param[OptionsDefine.Language]:
|
|
2750
2964
|
profile.language = g_param[OptionsDefine.Language]
|
|
2751
2965
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2785,7 +2999,10 @@ def doDescribeHealthScoreTimeSeries(args, parsed_globals):
|
|
|
2785
2999
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2786
3000
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2787
3001
|
)
|
|
2788
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3002
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3004
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3005
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2789
3006
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2790
3007
|
else:
|
|
2791
3008
|
cred = credential.Credential(
|
|
@@ -2797,7 +3014,7 @@ def doDescribeHealthScoreTimeSeries(args, parsed_globals):
|
|
|
2797
3014
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2798
3015
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2799
3016
|
)
|
|
2800
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3017
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2801
3018
|
if g_param[OptionsDefine.Language]:
|
|
2802
3019
|
profile.language = g_param[OptionsDefine.Language]
|
|
2803
3020
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2837,7 +3054,10 @@ def doDeleteSqlFilters(args, parsed_globals):
|
|
|
2837
3054
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2838
3055
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2839
3056
|
)
|
|
2840
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3057
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3059
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3060
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
3061
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
3062
|
else:
|
|
2843
3063
|
cred = credential.Credential(
|
|
@@ -2849,7 +3069,7 @@ def doDeleteSqlFilters(args, parsed_globals):
|
|
|
2849
3069
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2850
3070
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2851
3071
|
)
|
|
2852
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3072
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2853
3073
|
if g_param[OptionsDefine.Language]:
|
|
2854
3074
|
profile.language = g_param[OptionsDefine.Language]
|
|
2855
3075
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2889,7 +3109,10 @@ def doCancelKillTask(args, parsed_globals):
|
|
|
2889
3109
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2890
3110
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2891
3111
|
)
|
|
2892
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3112
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3114
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3115
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2893
3116
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2894
3117
|
else:
|
|
2895
3118
|
cred = credential.Credential(
|
|
@@ -2901,7 +3124,7 @@ def doCancelKillTask(args, parsed_globals):
|
|
|
2901
3124
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2902
3125
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2903
3126
|
)
|
|
2904
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3127
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2905
3128
|
if g_param[OptionsDefine.Language]:
|
|
2906
3129
|
profile.language = g_param[OptionsDefine.Language]
|
|
2907
3130
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2941,7 +3164,10 @@ def doModifyAlarmPolicy(args, parsed_globals):
|
|
|
2941
3164
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2942
3165
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2943
3166
|
)
|
|
2944
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3167
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3169
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3170
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2945
3171
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2946
3172
|
else:
|
|
2947
3173
|
cred = credential.Credential(
|
|
@@ -2953,7 +3179,7 @@ def doModifyAlarmPolicy(args, parsed_globals):
|
|
|
2953
3179
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2954
3180
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2955
3181
|
)
|
|
2956
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3182
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2957
3183
|
if g_param[OptionsDefine.Language]:
|
|
2958
3184
|
profile.language = g_param[OptionsDefine.Language]
|
|
2959
3185
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2993,7 +3219,10 @@ def doCreateUserAutonomyProfile(args, parsed_globals):
|
|
|
2993
3219
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2994
3220
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2995
3221
|
)
|
|
2996
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3222
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3224
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3225
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2997
3226
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2998
3227
|
else:
|
|
2999
3228
|
cred = credential.Credential(
|
|
@@ -3005,7 +3234,7 @@ def doCreateUserAutonomyProfile(args, parsed_globals):
|
|
|
3005
3234
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3006
3235
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3007
3236
|
)
|
|
3008
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3237
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3009
3238
|
if g_param[OptionsDefine.Language]:
|
|
3010
3239
|
profile.language = g_param[OptionsDefine.Language]
|
|
3011
3240
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3045,7 +3274,10 @@ def doCreateMailProfile(args, parsed_globals):
|
|
|
3045
3274
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3046
3275
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3047
3276
|
)
|
|
3048
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3277
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3279
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3280
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3049
3281
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3050
3282
|
else:
|
|
3051
3283
|
cred = credential.Credential(
|
|
@@ -3057,7 +3289,7 @@ def doCreateMailProfile(args, parsed_globals):
|
|
|
3057
3289
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3058
3290
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3059
3291
|
)
|
|
3060
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3292
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3061
3293
|
if g_param[OptionsDefine.Language]:
|
|
3062
3294
|
profile.language = g_param[OptionsDefine.Language]
|
|
3063
3295
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3097,7 +3329,10 @@ def doAddUserContact(args, parsed_globals):
|
|
|
3097
3329
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3098
3330
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3099
3331
|
)
|
|
3100
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3332
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3334
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3335
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3101
3336
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3102
3337
|
else:
|
|
3103
3338
|
cred = credential.Credential(
|
|
@@ -3109,7 +3344,7 @@ def doAddUserContact(args, parsed_globals):
|
|
|
3109
3344
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3110
3345
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3111
3346
|
)
|
|
3112
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3347
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3113
3348
|
if g_param[OptionsDefine.Language]:
|
|
3114
3349
|
profile.language = g_param[OptionsDefine.Language]
|
|
3115
3350
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3149,7 +3384,10 @@ def doDescribeDiagDBInstances(args, parsed_globals):
|
|
|
3149
3384
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3150
3385
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3151
3386
|
)
|
|
3152
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3387
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3389
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3390
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3153
3391
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3154
3392
|
else:
|
|
3155
3393
|
cred = credential.Credential(
|
|
@@ -3161,7 +3399,7 @@ def doDescribeDiagDBInstances(args, parsed_globals):
|
|
|
3161
3399
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3162
3400
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3163
3401
|
)
|
|
3164
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3402
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3165
3403
|
if g_param[OptionsDefine.Language]:
|
|
3166
3404
|
profile.language = g_param[OptionsDefine.Language]
|
|
3167
3405
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3201,7 +3439,10 @@ def doDescribeIndexRecommendAggregationSlowLogs(args, parsed_globals):
|
|
|
3201
3439
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3202
3440
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3203
3441
|
)
|
|
3204
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3442
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3444
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3445
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3205
3446
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3206
3447
|
else:
|
|
3207
3448
|
cred = credential.Credential(
|
|
@@ -3213,7 +3454,7 @@ def doDescribeIndexRecommendAggregationSlowLogs(args, parsed_globals):
|
|
|
3213
3454
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3214
3455
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3215
3456
|
)
|
|
3216
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3457
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3217
3458
|
if g_param[OptionsDefine.Language]:
|
|
3218
3459
|
profile.language = g_param[OptionsDefine.Language]
|
|
3219
3460
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3253,7 +3494,10 @@ def doDescribeProxyProcessStatistics(args, parsed_globals):
|
|
|
3253
3494
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3254
3495
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3255
3496
|
)
|
|
3256
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3497
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3499
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3500
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3257
3501
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3258
3502
|
else:
|
|
3259
3503
|
cred = credential.Credential(
|
|
@@ -3265,7 +3509,7 @@ def doDescribeProxyProcessStatistics(args, parsed_globals):
|
|
|
3265
3509
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3266
3510
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3267
3511
|
)
|
|
3268
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3512
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3269
3513
|
if g_param[OptionsDefine.Language]:
|
|
3270
3514
|
profile.language = g_param[OptionsDefine.Language]
|
|
3271
3515
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3305,7 +3549,10 @@ def doCancelDBAutonomyAction(args, parsed_globals):
|
|
|
3305
3549
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3306
3550
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3307
3551
|
)
|
|
3308
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3552
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3554
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3555
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3309
3556
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3310
3557
|
else:
|
|
3311
3558
|
cred = credential.Credential(
|
|
@@ -3317,7 +3564,7 @@ def doCancelDBAutonomyAction(args, parsed_globals):
|
|
|
3317
3564
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3318
3565
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3319
3566
|
)
|
|
3320
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3567
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3321
3568
|
if g_param[OptionsDefine.Language]:
|
|
3322
3569
|
profile.language = g_param[OptionsDefine.Language]
|
|
3323
3570
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3357,7 +3604,10 @@ def doDescribeRedisSlowLogTopSqls(args, parsed_globals):
|
|
|
3357
3604
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3358
3605
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3359
3606
|
)
|
|
3360
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3607
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3609
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3610
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3361
3611
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3362
3612
|
else:
|
|
3363
3613
|
cred = credential.Credential(
|
|
@@ -3369,7 +3619,7 @@ def doDescribeRedisSlowLogTopSqls(args, parsed_globals):
|
|
|
3369
3619
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3370
3620
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3371
3621
|
)
|
|
3372
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3622
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3373
3623
|
if g_param[OptionsDefine.Language]:
|
|
3374
3624
|
profile.language = g_param[OptionsDefine.Language]
|
|
3375
3625
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3409,7 +3659,10 @@ def doCreateKillTask(args, parsed_globals):
|
|
|
3409
3659
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3410
3660
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3411
3661
|
)
|
|
3412
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3662
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3664
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3665
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3413
3666
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3414
3667
|
else:
|
|
3415
3668
|
cred = credential.Credential(
|
|
@@ -3421,7 +3674,7 @@ def doCreateKillTask(args, parsed_globals):
|
|
|
3421
3674
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3422
3675
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3423
3676
|
)
|
|
3424
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3677
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3425
3678
|
if g_param[OptionsDefine.Language]:
|
|
3426
3679
|
profile.language = g_param[OptionsDefine.Language]
|
|
3427
3680
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3461,7 +3714,10 @@ def doUpdateAgentSwitch(args, parsed_globals):
|
|
|
3461
3714
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3462
3715
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3463
3716
|
)
|
|
3464
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3717
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3719
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3720
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3465
3721
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3466
3722
|
else:
|
|
3467
3723
|
cred = credential.Credential(
|
|
@@ -3473,7 +3729,7 @@ def doUpdateAgentSwitch(args, parsed_globals):
|
|
|
3473
3729
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3474
3730
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3475
3731
|
)
|
|
3476
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3732
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3477
3733
|
if g_param[OptionsDefine.Language]:
|
|
3478
3734
|
profile.language = g_param[OptionsDefine.Language]
|
|
3479
3735
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3513,7 +3769,10 @@ def doDescribeNoPrimaryKeyTables(args, parsed_globals):
|
|
|
3513
3769
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3514
3770
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3515
3771
|
)
|
|
3516
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3772
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3774
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3775
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3517
3776
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3518
3777
|
else:
|
|
3519
3778
|
cred = credential.Credential(
|
|
@@ -3525,7 +3784,7 @@ def doDescribeNoPrimaryKeyTables(args, parsed_globals):
|
|
|
3525
3784
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3526
3785
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3527
3786
|
)
|
|
3528
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3787
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3529
3788
|
if g_param[OptionsDefine.Language]:
|
|
3530
3789
|
profile.language = g_param[OptionsDefine.Language]
|
|
3531
3790
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3565,7 +3824,10 @@ def doDescribeMetricTopProxies(args, parsed_globals):
|
|
|
3565
3824
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3566
3825
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3567
3826
|
)
|
|
3568
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3827
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3829
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3830
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3569
3831
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3570
3832
|
else:
|
|
3571
3833
|
cred = credential.Credential(
|
|
@@ -3577,7 +3839,7 @@ def doDescribeMetricTopProxies(args, parsed_globals):
|
|
|
3577
3839
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3578
3840
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3579
3841
|
)
|
|
3580
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3842
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3581
3843
|
if g_param[OptionsDefine.Language]:
|
|
3582
3844
|
profile.language = g_param[OptionsDefine.Language]
|
|
3583
3845
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3617,7 +3879,10 @@ def doDescribeUserSqlAdvice(args, parsed_globals):
|
|
|
3617
3879
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3618
3880
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3619
3881
|
)
|
|
3620
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3882
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3884
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3885
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3621
3886
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3622
3887
|
else:
|
|
3623
3888
|
cred = credential.Credential(
|
|
@@ -3629,7 +3894,7 @@ def doDescribeUserSqlAdvice(args, parsed_globals):
|
|
|
3629
3894
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3630
3895
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3631
3896
|
)
|
|
3632
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3897
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3633
3898
|
if g_param[OptionsDefine.Language]:
|
|
3634
3899
|
profile.language = g_param[OptionsDefine.Language]
|
|
3635
3900
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3669,7 +3934,10 @@ def doDescribeSqlFilters(args, parsed_globals):
|
|
|
3669
3934
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3670
3935
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3671
3936
|
)
|
|
3672
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3937
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3939
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3940
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3673
3941
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3674
3942
|
else:
|
|
3675
3943
|
cred = credential.Credential(
|
|
@@ -3681,7 +3949,7 @@ def doDescribeSqlFilters(args, parsed_globals):
|
|
|
3681
3949
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3682
3950
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3683
3951
|
)
|
|
3684
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3952
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3685
3953
|
if g_param[OptionsDefine.Language]:
|
|
3686
3954
|
profile.language = g_param[OptionsDefine.Language]
|
|
3687
3955
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3721,7 +3989,10 @@ def doDescribeTopSpaceTables(args, parsed_globals):
|
|
|
3721
3989
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3722
3990
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3723
3991
|
)
|
|
3724
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3992
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3994
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3995
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3725
3996
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3726
3997
|
else:
|
|
3727
3998
|
cred = credential.Credential(
|
|
@@ -3733,7 +4004,7 @@ def doDescribeTopSpaceTables(args, parsed_globals):
|
|
|
3733
4004
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3734
4005
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3735
4006
|
)
|
|
3736
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4007
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3737
4008
|
if g_param[OptionsDefine.Language]:
|
|
3738
4009
|
profile.language = g_param[OptionsDefine.Language]
|
|
3739
4010
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3773,7 +4044,10 @@ def doModifyDiagDBInstanceConf(args, parsed_globals):
|
|
|
3773
4044
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3774
4045
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3775
4046
|
)
|
|
3776
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4047
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4049
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4050
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3777
4051
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3778
4052
|
else:
|
|
3779
4053
|
cred = credential.Credential(
|
|
@@ -3785,7 +4059,7 @@ def doModifyDiagDBInstanceConf(args, parsed_globals):
|
|
|
3785
4059
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3786
4060
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3787
4061
|
)
|
|
3788
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4062
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3789
4063
|
if g_param[OptionsDefine.Language]:
|
|
3790
4064
|
profile.language = g_param[OptionsDefine.Language]
|
|
3791
4065
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3825,7 +4099,10 @@ def doUpdateMonitorSwitch(args, parsed_globals):
|
|
|
3825
4099
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3826
4100
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3827
4101
|
)
|
|
3828
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3829
4106
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3830
4107
|
else:
|
|
3831
4108
|
cred = credential.Credential(
|
|
@@ -3837,7 +4114,7 @@ def doUpdateMonitorSwitch(args, parsed_globals):
|
|
|
3837
4114
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3838
4115
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3839
4116
|
)
|
|
3840
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4117
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3841
4118
|
if g_param[OptionsDefine.Language]:
|
|
3842
4119
|
profile.language = g_param[OptionsDefine.Language]
|
|
3843
4120
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3877,7 +4154,10 @@ def doDescribeSlowLogTopSqls(args, parsed_globals):
|
|
|
3877
4154
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3878
4155
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3879
4156
|
)
|
|
3880
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4157
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4159
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4160
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3881
4161
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3882
4162
|
else:
|
|
3883
4163
|
cred = credential.Credential(
|
|
@@ -3889,7 +4169,7 @@ def doDescribeSlowLogTopSqls(args, parsed_globals):
|
|
|
3889
4169
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3890
4170
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3891
4171
|
)
|
|
3892
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4172
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3893
4173
|
if g_param[OptionsDefine.Language]:
|
|
3894
4174
|
profile.language = g_param[OptionsDefine.Language]
|
|
3895
4175
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3929,7 +4209,10 @@ def doDescribeDBDiagReportContent(args, parsed_globals):
|
|
|
3929
4209
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3930
4210
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3931
4211
|
)
|
|
3932
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4212
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4214
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4215
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3933
4216
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3934
4217
|
else:
|
|
3935
4218
|
cred = credential.Credential(
|
|
@@ -3941,7 +4224,7 @@ def doDescribeDBDiagReportContent(args, parsed_globals):
|
|
|
3941
4224
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3942
4225
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3943
4226
|
)
|
|
3944
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4227
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3945
4228
|
if g_param[OptionsDefine.Language]:
|
|
3946
4229
|
profile.language = g_param[OptionsDefine.Language]
|
|
3947
4230
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3981,7 +4264,10 @@ def doCreateSqlFilter(args, parsed_globals):
|
|
|
3981
4264
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3982
4265
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3983
4266
|
)
|
|
3984
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4267
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4269
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4270
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3985
4271
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3986
4272
|
else:
|
|
3987
4273
|
cred = credential.Credential(
|
|
@@ -3993,7 +4279,7 @@ def doCreateSqlFilter(args, parsed_globals):
|
|
|
3993
4279
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3994
4280
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3995
4281
|
)
|
|
3996
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4282
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3997
4283
|
if g_param[OptionsDefine.Language]:
|
|
3998
4284
|
profile.language = g_param[OptionsDefine.Language]
|
|
3999
4285
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4033,7 +4319,10 @@ def doModifySqlFilters(args, parsed_globals):
|
|
|
4033
4319
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4034
4320
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4035
4321
|
)
|
|
4036
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4322
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4324
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4325
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4037
4326
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4038
4327
|
else:
|
|
4039
4328
|
cred = credential.Credential(
|
|
@@ -4045,7 +4334,7 @@ def doModifySqlFilters(args, parsed_globals):
|
|
|
4045
4334
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4046
4335
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4047
4336
|
)
|
|
4048
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4337
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4049
4338
|
if g_param[OptionsDefine.Language]:
|
|
4050
4339
|
profile.language = g_param[OptionsDefine.Language]
|
|
4051
4340
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4085,7 +4374,10 @@ def doDescribeProxySessionKillTasks(args, parsed_globals):
|
|
|
4085
4374
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4086
4375
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4087
4376
|
)
|
|
4088
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4377
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4379
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4380
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4089
4381
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4090
4382
|
else:
|
|
4091
4383
|
cred = credential.Credential(
|
|
@@ -4097,7 +4389,7 @@ def doDescribeProxySessionKillTasks(args, parsed_globals):
|
|
|
4097
4389
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4098
4390
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4099
4391
|
)
|
|
4100
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4392
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4101
4393
|
if g_param[OptionsDefine.Language]:
|
|
4102
4394
|
profile.language = g_param[OptionsDefine.Language]
|
|
4103
4395
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4137,7 +4429,10 @@ def doModifyUserAutonomyProfile(args, parsed_globals):
|
|
|
4137
4429
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4138
4430
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4139
4431
|
)
|
|
4140
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4432
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4434
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4435
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4141
4436
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4142
4437
|
else:
|
|
4143
4438
|
cred = credential.Credential(
|
|
@@ -4149,7 +4444,7 @@ def doModifyUserAutonomyProfile(args, parsed_globals):
|
|
|
4149
4444
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4150
4445
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4151
4446
|
)
|
|
4152
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4447
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4153
4448
|
if g_param[OptionsDefine.Language]:
|
|
4154
4449
|
profile.language = g_param[OptionsDefine.Language]
|
|
4155
4450
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4189,7 +4484,10 @@ def doCreateDBDiagReportUrl(args, parsed_globals):
|
|
|
4189
4484
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4190
4485
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4191
4486
|
)
|
|
4192
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4487
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4489
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4490
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4193
4491
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4194
4492
|
else:
|
|
4195
4493
|
cred = credential.Credential(
|
|
@@ -4201,7 +4499,7 @@ def doCreateDBDiagReportUrl(args, parsed_globals):
|
|
|
4201
4499
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4202
4500
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4203
4501
|
)
|
|
4204
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4502
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4205
4503
|
if g_param[OptionsDefine.Language]:
|
|
4206
4504
|
profile.language = g_param[OptionsDefine.Language]
|
|
4207
4505
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4241,7 +4539,10 @@ def doDescribeAlarmTemplate(args, parsed_globals):
|
|
|
4241
4539
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4242
4540
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4243
4541
|
)
|
|
4244
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4542
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4544
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4545
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4245
4546
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4246
4547
|
else:
|
|
4247
4548
|
cred = credential.Credential(
|
|
@@ -4253,7 +4554,7 @@ def doDescribeAlarmTemplate(args, parsed_globals):
|
|
|
4253
4554
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4254
4555
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4255
4556
|
)
|
|
4256
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4557
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4257
4558
|
if g_param[OptionsDefine.Language]:
|
|
4258
4559
|
profile.language = g_param[OptionsDefine.Language]
|
|
4259
4560
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4293,7 +4594,10 @@ def doDescribeSlowLogQueryTimeStats(args, parsed_globals):
|
|
|
4293
4594
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4294
4595
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4295
4596
|
)
|
|
4296
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4597
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4599
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4600
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4297
4601
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4298
4602
|
else:
|
|
4299
4603
|
cred = credential.Credential(
|
|
@@ -4305,7 +4609,7 @@ def doDescribeSlowLogQueryTimeStats(args, parsed_globals):
|
|
|
4305
4609
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4306
4610
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4307
4611
|
)
|
|
4308
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4612
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4309
4613
|
if g_param[OptionsDefine.Language]:
|
|
4310
4614
|
profile.language = g_param[OptionsDefine.Language]
|
|
4311
4615
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4369,6 +4673,7 @@ ACTION_MAP = {
|
|
|
4369
4673
|
"DescribeDBDiagEvents": doDescribeDBDiagEvents,
|
|
4370
4674
|
"DescribeAuditInstanceList": doDescribeAuditInstanceList,
|
|
4371
4675
|
"DeleteRedisBigKeyAnalysisTasks": doDeleteRedisBigKeyAnalysisTasks,
|
|
4676
|
+
"DescribeMongoDBProcessList": doDescribeMongoDBProcessList,
|
|
4372
4677
|
"DescribeTopSpaceTableTimeSeries": doDescribeTopSpaceTableTimeSeries,
|
|
4373
4678
|
"CreateDBDiagReportTask": doCreateDBDiagReportTask,
|
|
4374
4679
|
"DescribeRedisProcessList": doDescribeRedisProcessList,
|