tccli-intl-en 3.0.1168.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/plugins/sso/__init__.py +14 -0
- tccli/plugins/sso/login.py +23 -6
- tccli/plugins/sso/texts.py +4 -0
- tccli/services/__init__.py +49 -2
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +341 -114
- tccli/services/autoscaling/v20180419/api.json +514 -333
- tccli/services/autoscaling/v20180419/examples.json +46 -38
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/__init__.py +4 -0
- tccli/services/bi/bi_client.py +1498 -0
- tccli/services/bi/v20220105/api.json +5769 -0
- tccli/services/bi/v20220105/examples.json +215 -0
- tccli/services/billing/billing_client.py +1055 -134
- tccli/services/billing/v20180709/api.json +1654 -243
- tccli/services/billing/v20180709/examples.json +169 -25
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/captcha/v20190722/api.json +16 -6
- tccli/services/captcha/v20190722/examples.json +3 -3
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +1167 -268
- tccli/services/ccc/v20200210/api.json +2263 -202
- tccli/services/ccc/v20200210/examples.json +116 -12
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdb/v20170320/api.json +426 -173
- tccli/services/cdb/v20170320/examples.json +6 -6
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfg/v20210820/api.json +30 -10
- tccli/services/cfg/v20210820/examples.json +1 -1
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1033 -255
- tccli/services/ckafka/v20190819/api.json +3378 -1681
- tccli/services/ckafka/v20190819/examples.json +254 -160
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2307 -1024
- tccli/services/clb/v20180317/examples.json +186 -126
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +339 -78
- tccli/services/csip/v20221121/api.json +1011 -38
- tccli/services/csip/v20221121/examples.json +24 -0
- tccli/services/ctsdb/__init__.py +4 -0
- tccli/services/ctsdb/ctsdb_client.py +266 -0
- tccli/services/ctsdb/v20230202/api.json +677 -0
- tccli/services/ctsdb/v20230202/examples.json +20 -0
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +1141 -510
- tccli/services/cvm/v20170312/examples.json +174 -128
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +3051 -575
- tccli/services/cynosdb/v20190107/api.json +14074 -7139
- tccli/services/cynosdb/v20190107/examples.json +597 -287
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +390 -111
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +3104 -117
- tccli/services/emr/v20190103/api.json +15311 -4361
- tccli/services/emr/v20190103/examples.json +452 -42
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +172 -45
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +266 -0
- tccli/services/hunyuan/v20230901/api.json +270 -0
- tccli/services/hunyuan/v20230901/examples.json +20 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iai/v20200303/api.json +187 -51
- tccli/services/iai/v20200303/examples.json +30 -12
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/ims/v20201229/api.json +133 -141
- tccli/services/ims/v20201229/examples.json +3 -3
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +516 -72
- tccli/services/intlpartnersmgt/v20220928/api.json +976 -60
- tccli/services/intlpartnersmgt/v20220928/examples.json +50 -2
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/iotcloud/v20210408/api.json +216 -107
- tccli/services/iotcloud/v20210408/examples.json +9 -9
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +1226 -227
- tccli/services/kms/v20190118/api.json +1562 -144
- tccli/services/kms/v20190118/examples.json +204 -78
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +370 -148
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +804 -232
- tccli/services/live/v20180801/api.json +272 -0
- tccli/services/live/v20180801/examples.json +32 -0
- tccli/services/lke/__init__.py +4 -0
- tccli/services/lke/lke_client.py +5194 -0
- tccli/services/lke/v20231130/api.json +14803 -0
- tccli/services/lke/v20231130/examples.json +736 -0
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +953 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +402 -82
- tccli/services/mdl/v20200326/api.json +1144 -58
- tccli/services/mdl/v20200326/examples.json +48 -16
- tccli/services/mdp/mdp_client.py +785 -122
- tccli/services/mdp/v20200527/api.json +1168 -44
- tccli/services/mdp/v20200527/examples.json +151 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1452 -136
- tccli/services/mongodb/v20190725/api.json +4393 -1462
- tccli/services/mongodb/v20190725/examples.json +265 -71
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +660 -11
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1573 -354
- tccli/services/mps/v20190612/api.json +12394 -7243
- tccli/services/mps/v20190612/examples.json +244 -84
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +596 -102
- tccli/services/ocr/v20181119/api.json +2271 -181
- tccli/services/ocr/v20181119/examples.json +70 -8
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +206 -60
- tccli/services/privatedns/v20201028/api.json +179 -0
- tccli/services/privatedns/v20201028/examples.json +8 -0
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +698 -212
- tccli/services/redis/v20180412/api.json +968 -563
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/__init__.py +4 -0
- tccli/services/region/region_client.py +322 -0
- tccli/services/region/v20220627/api.json +399 -0
- tccli/services/region/v20220627/examples.json +29 -0
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +368 -69
- tccli/services/ses/v20201002/api.json +240 -0
- tccli/services/ses/v20201002/examples.json +32 -0
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3855 -470
- tccli/services/sqlserver/v20180328/api.json +9757 -3347
- tccli/services/sqlserver/v20180328/examples.json +480 -20
- tccli/services/ssl/ssl_client.py +504 -72
- tccli/services/ssl/v20191205/api.json +789 -21
- tccli/services/ssl/v20191205/examples.json +54 -0
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/__init__.py +4 -0
- tccli/services/tbaas/tbaas_client.py +378 -0
- tccli/services/tbaas/v20180416/api.json +551 -0
- tccli/services/tbaas/v20180416/examples.json +37 -0
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +4507 -966
- tccli/services/teo/v20220901/api.json +7341 -1405
- tccli/services/teo/v20220901/examples.json +679 -99
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +741 -274
- tccli/services/tke/v20180525/api.json +132 -7
- tccli/services/tke/v20180525/examples.json +42 -16
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tms/v20201229/api.json +91 -100
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/__init__.py +4 -0
- tccli/services/trabbit/trabbit_client.py +1778 -0
- tccli/services/trabbit/v20230418/api.json +4772 -0
- tccli/services/trabbit/v20230418/examples.json +237 -0
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +928 -192
- tccli/services/trtc/v20190722/api.json +1810 -256
- tccli/services/trtc/v20190722/examples.json +100 -6
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/v20210922/api.json +61 -30
- tccli/services/vm/v20210922/examples.json +0 -12
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/v20180717/api.json +332 -52
- tccli/services/vod/v20180717/examples.json +9 -1
- tccli/services/vod/v20240718/api.json +1105 -0
- tccli/services/vod/v20240718/examples.json +97 -0
- tccli/services/vod/vod_client.py +1316 -350
- tccli/services/vpc/v20170312/api.json +1166 -106
- tccli/services/vpc/v20170312/examples.json +197 -23
- tccli/services/vpc/vpc_client.py +2413 -739
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20210820/api.json +1577 -231
- tccli/services/wedata/v20210820/examples.json +74 -12
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6366 -1191
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +294 -230
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
|
@@ -27,7 +27,10 @@ def doDescribeRoute(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDescribeRoute(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDescribeGroupInfo(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDescribeGroupInfo(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doCreateConsumer(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doCreateConsumer(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doCreateAcl(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doCreateAcl(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -225,7 +237,7 @@ def doCreateAcl(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
228
|
-
def
|
|
240
|
+
def doDescribeTypeInstances(args, parsed_globals):
|
|
229
241
|
g_param = parse_global_arg(parsed_globals)
|
|
230
242
|
|
|
231
243
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -235,7 +247,10 @@ def doCreateInstancePost(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,18 +262,73 @@ def doCreateInstancePost(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
254
269
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
270
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
271
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
272
|
+
model = models.DescribeTypeInstancesRequest()
|
|
258
273
|
model.from_json_string(json.dumps(args))
|
|
259
274
|
start_time = time.time()
|
|
260
275
|
while True:
|
|
261
|
-
rsp = client.
|
|
276
|
+
rsp = client.DescribeTypeInstances(model)
|
|
277
|
+
result = rsp.to_json_string()
|
|
278
|
+
try:
|
|
279
|
+
json_obj = json.loads(result)
|
|
280
|
+
except TypeError as e:
|
|
281
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
282
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
283
|
+
break
|
|
284
|
+
cur_time = time.time()
|
|
285
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
286
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
287
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
288
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
289
|
+
else:
|
|
290
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
291
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
292
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
293
|
+
|
|
294
|
+
|
|
295
|
+
def doDescribeDatahubTopics(args, parsed_globals):
|
|
296
|
+
g_param = parse_global_arg(parsed_globals)
|
|
297
|
+
|
|
298
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
299
|
+
cred = credential.CVMRoleCredential()
|
|
300
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
301
|
+
cred = credential.STSAssumeRoleCredential(
|
|
302
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
303
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
304
|
+
)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
309
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
310
|
+
else:
|
|
311
|
+
cred = credential.Credential(
|
|
312
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
313
|
+
)
|
|
314
|
+
http_profile = HttpProfile(
|
|
315
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
316
|
+
reqMethod="POST",
|
|
317
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
318
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
319
|
+
)
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
321
|
+
if g_param[OptionsDefine.Language]:
|
|
322
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
323
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
324
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
325
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
326
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
327
|
+
model = models.DescribeDatahubTopicsRequest()
|
|
328
|
+
model.from_json_string(json.dumps(args))
|
|
329
|
+
start_time = time.time()
|
|
330
|
+
while True:
|
|
331
|
+
rsp = client.DescribeDatahubTopics(model)
|
|
262
332
|
result = rsp.to_json_string()
|
|
263
333
|
try:
|
|
264
334
|
json_obj = json.loads(result)
|
|
@@ -287,7 +357,560 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
287
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
359
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
364
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
365
|
+
else:
|
|
366
|
+
cred = credential.Credential(
|
|
367
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
368
|
+
)
|
|
369
|
+
http_profile = HttpProfile(
|
|
370
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
371
|
+
reqMethod="POST",
|
|
372
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
373
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
374
|
+
)
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
376
|
+
if g_param[OptionsDefine.Language]:
|
|
377
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
378
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
379
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
380
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
381
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
382
|
+
model = models.DescribeAclRuleRequest()
|
|
383
|
+
model.from_json_string(json.dumps(args))
|
|
384
|
+
start_time = time.time()
|
|
385
|
+
while True:
|
|
386
|
+
rsp = client.DescribeAclRule(model)
|
|
387
|
+
result = rsp.to_json_string()
|
|
388
|
+
try:
|
|
389
|
+
json_obj = json.loads(result)
|
|
390
|
+
except TypeError as e:
|
|
391
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
392
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
393
|
+
break
|
|
394
|
+
cur_time = time.time()
|
|
395
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
396
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
397
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
398
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
399
|
+
else:
|
|
400
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
401
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
402
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
403
|
+
|
|
404
|
+
|
|
405
|
+
def doCreateTopic(args, parsed_globals):
|
|
406
|
+
g_param = parse_global_arg(parsed_globals)
|
|
407
|
+
|
|
408
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
409
|
+
cred = credential.CVMRoleCredential()
|
|
410
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
411
|
+
cred = credential.STSAssumeRoleCredential(
|
|
412
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
413
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
414
|
+
)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
419
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
420
|
+
else:
|
|
421
|
+
cred = credential.Credential(
|
|
422
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
423
|
+
)
|
|
424
|
+
http_profile = HttpProfile(
|
|
425
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
426
|
+
reqMethod="POST",
|
|
427
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
428
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
429
|
+
)
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
431
|
+
if g_param[OptionsDefine.Language]:
|
|
432
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
433
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
434
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
435
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
436
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
437
|
+
model = models.CreateTopicRequest()
|
|
438
|
+
model.from_json_string(json.dumps(args))
|
|
439
|
+
start_time = time.time()
|
|
440
|
+
while True:
|
|
441
|
+
rsp = client.CreateTopic(model)
|
|
442
|
+
result = rsp.to_json_string()
|
|
443
|
+
try:
|
|
444
|
+
json_obj = json.loads(result)
|
|
445
|
+
except TypeError as e:
|
|
446
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
447
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
448
|
+
break
|
|
449
|
+
cur_time = time.time()
|
|
450
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
451
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
452
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
453
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
454
|
+
else:
|
|
455
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
456
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
457
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
458
|
+
|
|
459
|
+
|
|
460
|
+
def doDescribeSecurityGroupRoutes(args, parsed_globals):
|
|
461
|
+
g_param = parse_global_arg(parsed_globals)
|
|
462
|
+
|
|
463
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
464
|
+
cred = credential.CVMRoleCredential()
|
|
465
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
466
|
+
cred = credential.STSAssumeRoleCredential(
|
|
467
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
468
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
469
|
+
)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
474
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
475
|
+
else:
|
|
476
|
+
cred = credential.Credential(
|
|
477
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
478
|
+
)
|
|
479
|
+
http_profile = HttpProfile(
|
|
480
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
481
|
+
reqMethod="POST",
|
|
482
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
483
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
484
|
+
)
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
486
|
+
if g_param[OptionsDefine.Language]:
|
|
487
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
488
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
489
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
490
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
491
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
492
|
+
model = models.DescribeSecurityGroupRoutesRequest()
|
|
493
|
+
model.from_json_string(json.dumps(args))
|
|
494
|
+
start_time = time.time()
|
|
495
|
+
while True:
|
|
496
|
+
rsp = client.DescribeSecurityGroupRoutes(model)
|
|
497
|
+
result = rsp.to_json_string()
|
|
498
|
+
try:
|
|
499
|
+
json_obj = json.loads(result)
|
|
500
|
+
except TypeError as e:
|
|
501
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
502
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
503
|
+
break
|
|
504
|
+
cur_time = time.time()
|
|
505
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
506
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
507
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
508
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
509
|
+
else:
|
|
510
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
511
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
512
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
513
|
+
|
|
514
|
+
|
|
515
|
+
def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
516
|
+
g_param = parse_global_arg(parsed_globals)
|
|
517
|
+
|
|
518
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
519
|
+
cred = credential.CVMRoleCredential()
|
|
520
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
521
|
+
cred = credential.STSAssumeRoleCredential(
|
|
522
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
523
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
524
|
+
)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
529
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
530
|
+
else:
|
|
531
|
+
cred = credential.Credential(
|
|
532
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
533
|
+
)
|
|
534
|
+
http_profile = HttpProfile(
|
|
535
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
536
|
+
reqMethod="POST",
|
|
537
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
538
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
539
|
+
)
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
541
|
+
if g_param[OptionsDefine.Language]:
|
|
542
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
543
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
544
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
545
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
546
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
547
|
+
model = models.BatchModifyTopicAttributesRequest()
|
|
548
|
+
model.from_json_string(json.dumps(args))
|
|
549
|
+
start_time = time.time()
|
|
550
|
+
while True:
|
|
551
|
+
rsp = client.BatchModifyTopicAttributes(model)
|
|
552
|
+
result = rsp.to_json_string()
|
|
553
|
+
try:
|
|
554
|
+
json_obj = json.loads(result)
|
|
555
|
+
except TypeError as e:
|
|
556
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
557
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
558
|
+
break
|
|
559
|
+
cur_time = time.time()
|
|
560
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
561
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
562
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
563
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
564
|
+
else:
|
|
565
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
566
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
567
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
568
|
+
|
|
569
|
+
|
|
570
|
+
def doDeleteRoute(args, parsed_globals):
|
|
571
|
+
g_param = parse_global_arg(parsed_globals)
|
|
572
|
+
|
|
573
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
574
|
+
cred = credential.CVMRoleCredential()
|
|
575
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
576
|
+
cred = credential.STSAssumeRoleCredential(
|
|
577
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
578
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
579
|
+
)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
584
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
585
|
+
else:
|
|
586
|
+
cred = credential.Credential(
|
|
587
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
588
|
+
)
|
|
589
|
+
http_profile = HttpProfile(
|
|
590
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
591
|
+
reqMethod="POST",
|
|
592
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
593
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
594
|
+
)
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
596
|
+
if g_param[OptionsDefine.Language]:
|
|
597
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
598
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
599
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
600
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
601
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
602
|
+
model = models.DeleteRouteRequest()
|
|
603
|
+
model.from_json_string(json.dumps(args))
|
|
604
|
+
start_time = time.time()
|
|
605
|
+
while True:
|
|
606
|
+
rsp = client.DeleteRoute(model)
|
|
607
|
+
result = rsp.to_json_string()
|
|
608
|
+
try:
|
|
609
|
+
json_obj = json.loads(result)
|
|
610
|
+
except TypeError as e:
|
|
611
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
612
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
613
|
+
break
|
|
614
|
+
cur_time = time.time()
|
|
615
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
616
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
617
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
618
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
619
|
+
else:
|
|
620
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
621
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
622
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
623
|
+
|
|
624
|
+
|
|
625
|
+
def doSendMessage(args, parsed_globals):
|
|
626
|
+
g_param = parse_global_arg(parsed_globals)
|
|
627
|
+
|
|
628
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
629
|
+
cred = credential.CVMRoleCredential()
|
|
630
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
631
|
+
cred = credential.STSAssumeRoleCredential(
|
|
632
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
633
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
634
|
+
)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
639
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
640
|
+
else:
|
|
641
|
+
cred = credential.Credential(
|
|
642
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
643
|
+
)
|
|
644
|
+
http_profile = HttpProfile(
|
|
645
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
646
|
+
reqMethod="POST",
|
|
647
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
648
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
649
|
+
)
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
651
|
+
if g_param[OptionsDefine.Language]:
|
|
652
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
653
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
654
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
655
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
656
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
657
|
+
model = models.SendMessageRequest()
|
|
658
|
+
model.from_json_string(json.dumps(args))
|
|
659
|
+
start_time = time.time()
|
|
660
|
+
while True:
|
|
661
|
+
rsp = client.SendMessage(model)
|
|
662
|
+
result = rsp.to_json_string()
|
|
663
|
+
try:
|
|
664
|
+
json_obj = json.loads(result)
|
|
665
|
+
except TypeError as e:
|
|
666
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
667
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
668
|
+
break
|
|
669
|
+
cur_time = time.time()
|
|
670
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
671
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
672
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
673
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
674
|
+
else:
|
|
675
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
676
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
677
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
678
|
+
|
|
679
|
+
|
|
680
|
+
def doDescribeUser(args, parsed_globals):
|
|
681
|
+
g_param = parse_global_arg(parsed_globals)
|
|
682
|
+
|
|
683
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
684
|
+
cred = credential.CVMRoleCredential()
|
|
685
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
686
|
+
cred = credential.STSAssumeRoleCredential(
|
|
687
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
688
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
689
|
+
)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
694
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
695
|
+
else:
|
|
696
|
+
cred = credential.Credential(
|
|
697
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
698
|
+
)
|
|
699
|
+
http_profile = HttpProfile(
|
|
700
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
701
|
+
reqMethod="POST",
|
|
702
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
703
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
704
|
+
)
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
706
|
+
if g_param[OptionsDefine.Language]:
|
|
707
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
708
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
709
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
710
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
711
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
712
|
+
model = models.DescribeUserRequest()
|
|
713
|
+
model.from_json_string(json.dumps(args))
|
|
714
|
+
start_time = time.time()
|
|
715
|
+
while True:
|
|
716
|
+
rsp = client.DescribeUser(model)
|
|
717
|
+
result = rsp.to_json_string()
|
|
718
|
+
try:
|
|
719
|
+
json_obj = json.loads(result)
|
|
720
|
+
except TypeError as e:
|
|
721
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
722
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
723
|
+
break
|
|
724
|
+
cur_time = time.time()
|
|
725
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
726
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
727
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
728
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
729
|
+
else:
|
|
730
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
731
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
732
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
733
|
+
|
|
734
|
+
|
|
735
|
+
def doDescribeGroup(args, parsed_globals):
|
|
736
|
+
g_param = parse_global_arg(parsed_globals)
|
|
737
|
+
|
|
738
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
739
|
+
cred = credential.CVMRoleCredential()
|
|
740
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
741
|
+
cred = credential.STSAssumeRoleCredential(
|
|
742
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
743
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
744
|
+
)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
749
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
750
|
+
else:
|
|
751
|
+
cred = credential.Credential(
|
|
752
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
753
|
+
)
|
|
754
|
+
http_profile = HttpProfile(
|
|
755
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
756
|
+
reqMethod="POST",
|
|
757
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
758
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
759
|
+
)
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
761
|
+
if g_param[OptionsDefine.Language]:
|
|
762
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
763
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
764
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
765
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
766
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
767
|
+
model = models.DescribeGroupRequest()
|
|
768
|
+
model.from_json_string(json.dumps(args))
|
|
769
|
+
start_time = time.time()
|
|
770
|
+
while True:
|
|
771
|
+
rsp = client.DescribeGroup(model)
|
|
772
|
+
result = rsp.to_json_string()
|
|
773
|
+
try:
|
|
774
|
+
json_obj = json.loads(result)
|
|
775
|
+
except TypeError as e:
|
|
776
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
777
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
778
|
+
break
|
|
779
|
+
cur_time = time.time()
|
|
780
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
781
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
782
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
783
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
784
|
+
else:
|
|
785
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
786
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
787
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
788
|
+
|
|
789
|
+
|
|
790
|
+
def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
791
|
+
g_param = parse_global_arg(parsed_globals)
|
|
792
|
+
|
|
793
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
794
|
+
cred = credential.CVMRoleCredential()
|
|
795
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
796
|
+
cred = credential.STSAssumeRoleCredential(
|
|
797
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
798
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
799
|
+
)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
804
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
805
|
+
else:
|
|
806
|
+
cred = credential.Credential(
|
|
807
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
808
|
+
)
|
|
809
|
+
http_profile = HttpProfile(
|
|
810
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
811
|
+
reqMethod="POST",
|
|
812
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
813
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
814
|
+
)
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
816
|
+
if g_param[OptionsDefine.Language]:
|
|
817
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
818
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
819
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
820
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
821
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
822
|
+
model = models.CreateTopicIpWhiteListRequest()
|
|
823
|
+
model.from_json_string(json.dumps(args))
|
|
824
|
+
start_time = time.time()
|
|
825
|
+
while True:
|
|
826
|
+
rsp = client.CreateTopicIpWhiteList(model)
|
|
827
|
+
result = rsp.to_json_string()
|
|
828
|
+
try:
|
|
829
|
+
json_obj = json.loads(result)
|
|
830
|
+
except TypeError as e:
|
|
831
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
832
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
833
|
+
break
|
|
834
|
+
cur_time = time.time()
|
|
835
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
836
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
837
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
838
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
839
|
+
else:
|
|
840
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
841
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
842
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
843
|
+
|
|
844
|
+
|
|
845
|
+
def doDescribeCkafkaVersion(args, parsed_globals):
|
|
846
|
+
g_param = parse_global_arg(parsed_globals)
|
|
847
|
+
|
|
848
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
849
|
+
cred = credential.CVMRoleCredential()
|
|
850
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
851
|
+
cred = credential.STSAssumeRoleCredential(
|
|
852
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
853
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
854
|
+
)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
859
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
860
|
+
else:
|
|
861
|
+
cred = credential.Credential(
|
|
862
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
863
|
+
)
|
|
864
|
+
http_profile = HttpProfile(
|
|
865
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
866
|
+
reqMethod="POST",
|
|
867
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
868
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
869
|
+
)
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
871
|
+
if g_param[OptionsDefine.Language]:
|
|
872
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
873
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
874
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
875
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
876
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
877
|
+
model = models.DescribeCkafkaVersionRequest()
|
|
878
|
+
model.from_json_string(json.dumps(args))
|
|
879
|
+
start_time = time.time()
|
|
880
|
+
while True:
|
|
881
|
+
rsp = client.DescribeCkafkaVersion(model)
|
|
882
|
+
result = rsp.to_json_string()
|
|
883
|
+
try:
|
|
884
|
+
json_obj = json.loads(result)
|
|
885
|
+
except TypeError as e:
|
|
886
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
887
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
888
|
+
break
|
|
889
|
+
cur_time = time.time()
|
|
890
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
891
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
892
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
893
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
894
|
+
else:
|
|
895
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
896
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
897
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
898
|
+
|
|
899
|
+
|
|
900
|
+
def doModifyGroupOffsets(args, parsed_globals):
|
|
901
|
+
g_param = parse_global_arg(parsed_globals)
|
|
902
|
+
|
|
903
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
904
|
+
cred = credential.CVMRoleCredential()
|
|
905
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
906
|
+
cred = credential.STSAssumeRoleCredential(
|
|
907
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
908
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
909
|
+
)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
915
|
else:
|
|
293
916
|
cred = credential.Credential(
|
|
@@ -299,18 +922,18 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
299
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
924
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
926
|
if g_param[OptionsDefine.Language]:
|
|
304
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
306
929
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
930
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
931
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
-
model = models.
|
|
932
|
+
model = models.ModifyGroupOffsetsRequest()
|
|
310
933
|
model.from_json_string(json.dumps(args))
|
|
311
934
|
start_time = time.time()
|
|
312
935
|
while True:
|
|
313
|
-
rsp = client.
|
|
936
|
+
rsp = client.ModifyGroupOffsets(model)
|
|
314
937
|
result = rsp.to_json_string()
|
|
315
938
|
try:
|
|
316
939
|
json_obj = json.loads(result)
|
|
@@ -329,7 +952,7 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
329
952
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
953
|
|
|
331
954
|
|
|
332
|
-
def
|
|
955
|
+
def doUpgradeBrokerVersion(args, parsed_globals):
|
|
333
956
|
g_param = parse_global_arg(parsed_globals)
|
|
334
957
|
|
|
335
958
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -339,7 +962,10 @@ def doCreateTopic(args, parsed_globals):
|
|
|
339
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
964
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
970
|
else:
|
|
345
971
|
cred = credential.Credential(
|
|
@@ -351,18 +977,18 @@ def doCreateTopic(args, parsed_globals):
|
|
|
351
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
979
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
981
|
if g_param[OptionsDefine.Language]:
|
|
356
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
984
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
985
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
986
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
-
model = models.
|
|
987
|
+
model = models.UpgradeBrokerVersionRequest()
|
|
362
988
|
model.from_json_string(json.dumps(args))
|
|
363
989
|
start_time = time.time()
|
|
364
990
|
while True:
|
|
365
|
-
rsp = client.
|
|
991
|
+
rsp = client.UpgradeBrokerVersion(model)
|
|
366
992
|
result = rsp.to_json_string()
|
|
367
993
|
try:
|
|
368
994
|
json_obj = json.loads(result)
|
|
@@ -381,7 +1007,7 @@ def doCreateTopic(args, parsed_globals):
|
|
|
381
1007
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
1008
|
|
|
383
1009
|
|
|
384
|
-
def
|
|
1010
|
+
def doDescribeInstances(args, parsed_globals):
|
|
385
1011
|
g_param = parse_global_arg(parsed_globals)
|
|
386
1012
|
|
|
387
1013
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -391,7 +1017,10 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
391
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
1019
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
1025
|
else:
|
|
397
1026
|
cred = credential.Credential(
|
|
@@ -403,18 +1032,18 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
403
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
1034
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
1036
|
if g_param[OptionsDefine.Language]:
|
|
408
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
410
1039
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
1040
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
1041
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
-
model = models.
|
|
1042
|
+
model = models.DescribeInstancesRequest()
|
|
414
1043
|
model.from_json_string(json.dumps(args))
|
|
415
1044
|
start_time = time.time()
|
|
416
1045
|
while True:
|
|
417
|
-
rsp = client.
|
|
1046
|
+
rsp = client.DescribeInstances(model)
|
|
418
1047
|
result = rsp.to_json_string()
|
|
419
1048
|
try:
|
|
420
1049
|
json_obj = json.loads(result)
|
|
@@ -433,7 +1062,7 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
433
1062
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
434
1063
|
|
|
435
1064
|
|
|
436
|
-
def
|
|
1065
|
+
def doDescribeCvmInfo(args, parsed_globals):
|
|
437
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
438
1067
|
|
|
439
1068
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -443,7 +1072,10 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
443
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
1074
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
1080
|
else:
|
|
449
1081
|
cred = credential.Credential(
|
|
@@ -455,18 +1087,18 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
455
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
1089
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
1091
|
if g_param[OptionsDefine.Language]:
|
|
460
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
462
1094
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
463
1095
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
464
1096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
465
|
-
model = models.
|
|
1097
|
+
model = models.DescribeCvmInfoRequest()
|
|
466
1098
|
model.from_json_string(json.dumps(args))
|
|
467
1099
|
start_time = time.time()
|
|
468
1100
|
while True:
|
|
469
|
-
rsp = client.
|
|
1101
|
+
rsp = client.DescribeCvmInfo(model)
|
|
470
1102
|
result = rsp.to_json_string()
|
|
471
1103
|
try:
|
|
472
1104
|
json_obj = json.loads(result)
|
|
@@ -485,7 +1117,7 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
485
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
1118
|
|
|
487
1119
|
|
|
488
|
-
def
|
|
1120
|
+
def doDescribeDatahubTopic(args, parsed_globals):
|
|
489
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
490
1122
|
|
|
491
1123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -495,7 +1127,10 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
495
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
1129
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
1135
|
else:
|
|
501
1136
|
cred = credential.Credential(
|
|
@@ -507,18 +1142,18 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
507
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
1144
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
1146
|
if g_param[OptionsDefine.Language]:
|
|
512
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
1149
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
1150
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
1151
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
1152
|
+
model = models.DescribeDatahubTopicRequest()
|
|
518
1153
|
model.from_json_string(json.dumps(args))
|
|
519
1154
|
start_time = time.time()
|
|
520
1155
|
while True:
|
|
521
|
-
rsp = client.
|
|
1156
|
+
rsp = client.DescribeDatahubTopic(model)
|
|
522
1157
|
result = rsp.to_json_string()
|
|
523
1158
|
try:
|
|
524
1159
|
json_obj = json.loads(result)
|
|
@@ -537,7 +1172,7 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
537
1172
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
1173
|
|
|
539
1174
|
|
|
540
|
-
def
|
|
1175
|
+
def doCreateRoute(args, parsed_globals):
|
|
541
1176
|
g_param = parse_global_arg(parsed_globals)
|
|
542
1177
|
|
|
543
1178
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -547,7 +1182,10 @@ def doSendMessage(args, parsed_globals):
|
|
|
547
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
1184
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
1190
|
else:
|
|
553
1191
|
cred = credential.Credential(
|
|
@@ -559,18 +1197,18 @@ def doSendMessage(args, parsed_globals):
|
|
|
559
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
1199
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
1201
|
if g_param[OptionsDefine.Language]:
|
|
564
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
566
1204
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
1205
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
1206
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
1207
|
+
model = models.CreateRouteRequest()
|
|
570
1208
|
model.from_json_string(json.dumps(args))
|
|
571
1209
|
start_time = time.time()
|
|
572
1210
|
while True:
|
|
573
|
-
rsp = client.
|
|
1211
|
+
rsp = client.CreateRoute(model)
|
|
574
1212
|
result = rsp.to_json_string()
|
|
575
1213
|
try:
|
|
576
1214
|
json_obj = json.loads(result)
|
|
@@ -589,7 +1227,7 @@ def doSendMessage(args, parsed_globals):
|
|
|
589
1227
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
1228
|
|
|
591
1229
|
|
|
592
|
-
def
|
|
1230
|
+
def doDeleteGroup(args, parsed_globals):
|
|
593
1231
|
g_param = parse_global_arg(parsed_globals)
|
|
594
1232
|
|
|
595
1233
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -599,7 +1237,10 @@ def doDescribeUser(args, parsed_globals):
|
|
|
599
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
1239
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
1245
|
else:
|
|
605
1246
|
cred = credential.Credential(
|
|
@@ -611,18 +1252,18 @@ def doDescribeUser(args, parsed_globals):
|
|
|
611
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
1254
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
1256
|
if g_param[OptionsDefine.Language]:
|
|
616
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
618
1259
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
1260
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
1261
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
1262
|
+
model = models.DeleteGroupRequest()
|
|
622
1263
|
model.from_json_string(json.dumps(args))
|
|
623
1264
|
start_time = time.time()
|
|
624
1265
|
while True:
|
|
625
|
-
rsp = client.
|
|
1266
|
+
rsp = client.DeleteGroup(model)
|
|
626
1267
|
result = rsp.to_json_string()
|
|
627
1268
|
try:
|
|
628
1269
|
json_obj = json.loads(result)
|
|
@@ -641,7 +1282,7 @@ def doDescribeUser(args, parsed_globals):
|
|
|
641
1282
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
1283
|
|
|
643
1284
|
|
|
644
|
-
def
|
|
1285
|
+
def doModifyDatahubTopic(args, parsed_globals):
|
|
645
1286
|
g_param = parse_global_arg(parsed_globals)
|
|
646
1287
|
|
|
647
1288
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -651,7 +1292,10 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
651
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
1294
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
1300
|
else:
|
|
657
1301
|
cred = credential.Credential(
|
|
@@ -663,18 +1307,18 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
663
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
1309
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
1311
|
if g_param[OptionsDefine.Language]:
|
|
668
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
670
1314
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
671
1315
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
672
1316
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
673
|
-
model = models.
|
|
1317
|
+
model = models.ModifyDatahubTopicRequest()
|
|
674
1318
|
model.from_json_string(json.dumps(args))
|
|
675
1319
|
start_time = time.time()
|
|
676
1320
|
while True:
|
|
677
|
-
rsp = client.
|
|
1321
|
+
rsp = client.ModifyDatahubTopic(model)
|
|
678
1322
|
result = rsp.to_json_string()
|
|
679
1323
|
try:
|
|
680
1324
|
json_obj = json.loads(result)
|
|
@@ -693,7 +1337,7 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
693
1337
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
1338
|
|
|
695
1339
|
|
|
696
|
-
def
|
|
1340
|
+
def doFetchMessageListByOffset(args, parsed_globals):
|
|
697
1341
|
g_param = parse_global_arg(parsed_globals)
|
|
698
1342
|
|
|
699
1343
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -703,7 +1347,10 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
703
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
1349
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
1355
|
else:
|
|
709
1356
|
cred = credential.Credential(
|
|
@@ -715,18 +1362,18 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
715
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
1364
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
1366
|
if g_param[OptionsDefine.Language]:
|
|
720
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
722
1369
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
1370
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
1371
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
1372
|
+
model = models.FetchMessageListByOffsetRequest()
|
|
726
1373
|
model.from_json_string(json.dumps(args))
|
|
727
1374
|
start_time = time.time()
|
|
728
1375
|
while True:
|
|
729
|
-
rsp = client.
|
|
1376
|
+
rsp = client.FetchMessageListByOffset(model)
|
|
730
1377
|
result = rsp.to_json_string()
|
|
731
1378
|
try:
|
|
732
1379
|
json_obj = json.loads(result)
|
|
@@ -745,7 +1392,7 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
745
1392
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
1393
|
|
|
747
1394
|
|
|
748
|
-
def
|
|
1395
|
+
def doCreateDatahubTopic(args, parsed_globals):
|
|
749
1396
|
g_param = parse_global_arg(parsed_globals)
|
|
750
1397
|
|
|
751
1398
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -755,7 +1402,10 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
755
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
1404
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
1410
|
else:
|
|
761
1411
|
cred = credential.Credential(
|
|
@@ -767,18 +1417,18 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
767
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
1419
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
1421
|
if g_param[OptionsDefine.Language]:
|
|
772
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
774
1424
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
1425
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
1426
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
1427
|
+
model = models.CreateDatahubTopicRequest()
|
|
778
1428
|
model.from_json_string(json.dumps(args))
|
|
779
1429
|
start_time = time.time()
|
|
780
1430
|
while True:
|
|
781
|
-
rsp = client.
|
|
1431
|
+
rsp = client.CreateDatahubTopic(model)
|
|
782
1432
|
result = rsp.to_json_string()
|
|
783
1433
|
try:
|
|
784
1434
|
json_obj = json.loads(result)
|
|
@@ -797,7 +1447,7 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
797
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
1448
|
|
|
799
1449
|
|
|
800
|
-
def
|
|
1450
|
+
def doDeleteInstancePost(args, parsed_globals):
|
|
801
1451
|
g_param = parse_global_arg(parsed_globals)
|
|
802
1452
|
|
|
803
1453
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -807,7 +1457,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
807
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
1459
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
1465
|
else:
|
|
813
1466
|
cred = credential.Credential(
|
|
@@ -819,18 +1472,18 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
819
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
1474
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
1476
|
if g_param[OptionsDefine.Language]:
|
|
824
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
826
1479
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
1480
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
1481
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
1482
|
+
model = models.DeleteInstancePostRequest()
|
|
830
1483
|
model.from_json_string(json.dumps(args))
|
|
831
1484
|
start_time = time.time()
|
|
832
1485
|
while True:
|
|
833
|
-
rsp = client.
|
|
1486
|
+
rsp = client.DeleteInstancePost(model)
|
|
834
1487
|
result = rsp.to_json_string()
|
|
835
1488
|
try:
|
|
836
1489
|
json_obj = json.loads(result)
|
|
@@ -849,7 +1502,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
849
1502
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
1503
|
|
|
851
1504
|
|
|
852
|
-
def
|
|
1505
|
+
def doDescribeACL(args, parsed_globals):
|
|
853
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
854
1507
|
|
|
855
1508
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +1512,10 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
859
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
1514
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
1520
|
else:
|
|
865
1521
|
cred = credential.Credential(
|
|
@@ -871,18 +1527,18 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
871
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
1529
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
1531
|
if g_param[OptionsDefine.Language]:
|
|
876
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
878
1534
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
1535
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
1536
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
1537
|
+
model = models.DescribeACLRequest()
|
|
882
1538
|
model.from_json_string(json.dumps(args))
|
|
883
1539
|
start_time = time.time()
|
|
884
1540
|
while True:
|
|
885
|
-
rsp = client.
|
|
1541
|
+
rsp = client.DescribeACL(model)
|
|
886
1542
|
result = rsp.to_json_string()
|
|
887
1543
|
try:
|
|
888
1544
|
json_obj = json.loads(result)
|
|
@@ -901,7 +1557,7 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
901
1557
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
1558
|
|
|
903
1559
|
|
|
904
|
-
def
|
|
1560
|
+
def doDescribeTopicDetail(args, parsed_globals):
|
|
905
1561
|
g_param = parse_global_arg(parsed_globals)
|
|
906
1562
|
|
|
907
1563
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -911,7 +1567,10 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
911
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1569
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1575
|
else:
|
|
917
1576
|
cred = credential.Credential(
|
|
@@ -923,18 +1582,18 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
923
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
1584
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
1586
|
if g_param[OptionsDefine.Language]:
|
|
928
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
930
1589
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
1590
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
1591
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
1592
|
+
model = models.DescribeTopicDetailRequest()
|
|
934
1593
|
model.from_json_string(json.dumps(args))
|
|
935
1594
|
start_time = time.time()
|
|
936
1595
|
while True:
|
|
937
|
-
rsp = client.
|
|
1596
|
+
rsp = client.DescribeTopicDetail(model)
|
|
938
1597
|
result = rsp.to_json_string()
|
|
939
1598
|
try:
|
|
940
1599
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1612,7 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
953
1612
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1613
|
|
|
955
1614
|
|
|
956
|
-
def
|
|
1615
|
+
def doCreateInstancePre(args, parsed_globals):
|
|
957
1616
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1617
|
|
|
959
1618
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -963,7 +1622,10 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
963
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1624
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1630
|
else:
|
|
969
1631
|
cred = credential.Credential(
|
|
@@ -975,18 +1637,18 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
975
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1639
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1641
|
if g_param[OptionsDefine.Language]:
|
|
980
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
982
1644
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1645
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1646
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1647
|
+
model = models.CreateInstancePreRequest()
|
|
986
1648
|
model.from_json_string(json.dumps(args))
|
|
987
1649
|
start_time = time.time()
|
|
988
1650
|
while True:
|
|
989
|
-
rsp = client.
|
|
1651
|
+
rsp = client.CreateInstancePre(model)
|
|
990
1652
|
result = rsp.to_json_string()
|
|
991
1653
|
try:
|
|
992
1654
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1667,7 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
1005
1667
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1668
|
|
|
1007
1669
|
|
|
1008
|
-
def
|
|
1670
|
+
def doFetchMessageByOffset(args, parsed_globals):
|
|
1009
1671
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1672
|
|
|
1011
1673
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1015,7 +1677,10 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1015
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1679
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1685
|
else:
|
|
1021
1686
|
cred = credential.Credential(
|
|
@@ -1027,18 +1692,18 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1027
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1694
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1696
|
if g_param[OptionsDefine.Language]:
|
|
1032
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1034
1699
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1700
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1701
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1702
|
+
model = models.FetchMessageByOffsetRequest()
|
|
1038
1703
|
model.from_json_string(json.dumps(args))
|
|
1039
1704
|
start_time = time.time()
|
|
1040
1705
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1706
|
+
rsp = client.FetchMessageByOffset(model)
|
|
1042
1707
|
result = rsp.to_json_string()
|
|
1043
1708
|
try:
|
|
1044
1709
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1722,7 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1057
1722
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1723
|
|
|
1059
1724
|
|
|
1060
|
-
def
|
|
1725
|
+
def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
1061
1726
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1727
|
|
|
1063
1728
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1732,10 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1067
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1734
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1740
|
else:
|
|
1073
1741
|
cred = credential.Credential(
|
|
@@ -1079,18 +1747,18 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1079
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1749
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1751
|
if g_param[OptionsDefine.Language]:
|
|
1084
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1086
1754
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1755
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1756
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1757
|
+
model = models.DeleteTopicIpWhiteListRequest()
|
|
1090
1758
|
model.from_json_string(json.dumps(args))
|
|
1091
1759
|
start_time = time.time()
|
|
1092
1760
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1761
|
+
rsp = client.DeleteTopicIpWhiteList(model)
|
|
1094
1762
|
result = rsp.to_json_string()
|
|
1095
1763
|
try:
|
|
1096
1764
|
json_obj = json.loads(result)
|
|
@@ -1109,7 +1777,7 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1109
1777
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1778
|
|
|
1111
1779
|
|
|
1112
|
-
def
|
|
1780
|
+
def doModifyPassword(args, parsed_globals):
|
|
1113
1781
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1782
|
|
|
1115
1783
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1119,7 +1787,10 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1119
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1789
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1795
|
else:
|
|
1125
1796
|
cred = credential.Credential(
|
|
@@ -1131,18 +1802,18 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1131
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1804
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1806
|
if g_param[OptionsDefine.Language]:
|
|
1136
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1138
1809
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
1810
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
1811
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.
|
|
1812
|
+
model = models.ModifyPasswordRequest()
|
|
1142
1813
|
model.from_json_string(json.dumps(args))
|
|
1143
1814
|
start_time = time.time()
|
|
1144
1815
|
while True:
|
|
1145
|
-
rsp = client.
|
|
1816
|
+
rsp = client.ModifyPassword(model)
|
|
1146
1817
|
result = rsp.to_json_string()
|
|
1147
1818
|
try:
|
|
1148
1819
|
json_obj = json.loads(result)
|
|
@@ -1161,7 +1832,7 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1161
1832
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1162
1833
|
|
|
1163
1834
|
|
|
1164
|
-
def
|
|
1835
|
+
def doDescribeConsumerGroup(args, parsed_globals):
|
|
1165
1836
|
g_param = parse_global_arg(parsed_globals)
|
|
1166
1837
|
|
|
1167
1838
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1171,7 +1842,10 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1171
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1844
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1850
|
else:
|
|
1177
1851
|
cred = credential.Credential(
|
|
@@ -1183,18 +1857,18 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1183
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1859
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1861
|
if g_param[OptionsDefine.Language]:
|
|
1188
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1190
1864
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1191
1865
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1192
1866
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1193
|
-
model = models.
|
|
1867
|
+
model = models.DescribeConsumerGroupRequest()
|
|
1194
1868
|
model.from_json_string(json.dumps(args))
|
|
1195
1869
|
start_time = time.time()
|
|
1196
1870
|
while True:
|
|
1197
|
-
rsp = client.
|
|
1871
|
+
rsp = client.DescribeConsumerGroup(model)
|
|
1198
1872
|
result = rsp.to_json_string()
|
|
1199
1873
|
try:
|
|
1200
1874
|
json_obj = json.loads(result)
|
|
@@ -1213,7 +1887,7 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1213
1887
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1214
1888
|
|
|
1215
1889
|
|
|
1216
|
-
def
|
|
1890
|
+
def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
1217
1891
|
g_param = parse_global_arg(parsed_globals)
|
|
1218
1892
|
|
|
1219
1893
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1223,7 +1897,10 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
1223
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1899
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1905
|
else:
|
|
1229
1906
|
cred = credential.Credential(
|
|
@@ -1235,18 +1912,18 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
1235
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1914
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1916
|
if g_param[OptionsDefine.Language]:
|
|
1240
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1242
1919
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1243
1920
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1244
1921
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1245
|
-
model = models.
|
|
1922
|
+
model = models.DescribeTopicSubscribeGroupRequest()
|
|
1246
1923
|
model.from_json_string(json.dumps(args))
|
|
1247
1924
|
start_time = time.time()
|
|
1248
1925
|
while True:
|
|
1249
|
-
rsp = client.
|
|
1926
|
+
rsp = client.DescribeTopicSubscribeGroup(model)
|
|
1250
1927
|
result = rsp.to_json_string()
|
|
1251
1928
|
try:
|
|
1252
1929
|
json_obj = json.loads(result)
|
|
@@ -1265,7 +1942,7 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
1265
1942
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1943
|
|
|
1267
1944
|
|
|
1268
|
-
def
|
|
1945
|
+
def doModifyRoutineMaintenanceTask(args, parsed_globals):
|
|
1269
1946
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1947
|
|
|
1271
1948
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1275,7 +1952,10 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
1275
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1954
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1960
|
else:
|
|
1281
1961
|
cred = credential.Credential(
|
|
@@ -1287,18 +1967,18 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
1287
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1969
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1971
|
if g_param[OptionsDefine.Language]:
|
|
1292
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1294
1974
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1295
1975
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1296
1976
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1297
|
-
model = models.
|
|
1977
|
+
model = models.ModifyRoutineMaintenanceTaskRequest()
|
|
1298
1978
|
model.from_json_string(json.dumps(args))
|
|
1299
1979
|
start_time = time.time()
|
|
1300
1980
|
while True:
|
|
1301
|
-
rsp = client.
|
|
1981
|
+
rsp = client.ModifyRoutineMaintenanceTask(model)
|
|
1302
1982
|
result = rsp.to_json_string()
|
|
1303
1983
|
try:
|
|
1304
1984
|
json_obj = json.loads(result)
|
|
@@ -1317,7 +1997,7 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
1317
1997
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1318
1998
|
|
|
1319
1999
|
|
|
1320
|
-
def
|
|
2000
|
+
def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
1321
2001
|
g_param = parse_global_arg(parsed_globals)
|
|
1322
2002
|
|
|
1323
2003
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1327,7 +2007,10 @@ def doModifyPassword(args, parsed_globals):
|
|
|
1327
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
2009
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
2015
|
else:
|
|
1333
2016
|
cred = credential.Credential(
|
|
@@ -1339,18 +2022,18 @@ def doModifyPassword(args, parsed_globals):
|
|
|
1339
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
2024
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
2026
|
if g_param[OptionsDefine.Language]:
|
|
1344
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1346
2029
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1347
2030
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1348
2031
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1349
|
-
model = models.
|
|
2032
|
+
model = models.DeleteRouteTriggerTimeRequest()
|
|
1350
2033
|
model.from_json_string(json.dumps(args))
|
|
1351
2034
|
start_time = time.time()
|
|
1352
2035
|
while True:
|
|
1353
|
-
rsp = client.
|
|
2036
|
+
rsp = client.DeleteRouteTriggerTime(model)
|
|
1354
2037
|
result = rsp.to_json_string()
|
|
1355
2038
|
try:
|
|
1356
2039
|
json_obj = json.loads(result)
|
|
@@ -1369,7 +2052,7 @@ def doModifyPassword(args, parsed_globals):
|
|
|
1369
2052
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1370
2053
|
|
|
1371
2054
|
|
|
1372
|
-
def
|
|
2055
|
+
def doCreatePartition(args, parsed_globals):
|
|
1373
2056
|
g_param = parse_global_arg(parsed_globals)
|
|
1374
2057
|
|
|
1375
2058
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1379,7 +2062,10 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
1379
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
2064
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
2070
|
else:
|
|
1385
2071
|
cred = credential.Credential(
|
|
@@ -1391,18 +2077,18 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
1391
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
2079
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
2081
|
if g_param[OptionsDefine.Language]:
|
|
1396
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1398
2084
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1399
2085
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1400
2086
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1401
|
-
model = models.
|
|
2087
|
+
model = models.CreatePartitionRequest()
|
|
1402
2088
|
model.from_json_string(json.dumps(args))
|
|
1403
2089
|
start_time = time.time()
|
|
1404
2090
|
while True:
|
|
1405
|
-
rsp = client.
|
|
2091
|
+
rsp = client.CreatePartition(model)
|
|
1406
2092
|
result = rsp.to_json_string()
|
|
1407
2093
|
try:
|
|
1408
2094
|
json_obj = json.loads(result)
|
|
@@ -1421,7 +2107,7 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
1421
2107
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1422
2108
|
|
|
1423
2109
|
|
|
1424
|
-
def
|
|
2110
|
+
def doCreateUser(args, parsed_globals):
|
|
1425
2111
|
g_param = parse_global_arg(parsed_globals)
|
|
1426
2112
|
|
|
1427
2113
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1431,7 +2117,10 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
1431
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
2119
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
2125
|
else:
|
|
1437
2126
|
cred = credential.Credential(
|
|
@@ -1443,18 +2132,18 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
1443
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
2134
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
2136
|
if g_param[OptionsDefine.Language]:
|
|
1448
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1450
2139
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1451
2140
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1452
2141
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1453
|
-
model = models.
|
|
2142
|
+
model = models.CreateUserRequest()
|
|
1454
2143
|
model.from_json_string(json.dumps(args))
|
|
1455
2144
|
start_time = time.time()
|
|
1456
2145
|
while True:
|
|
1457
|
-
rsp = client.
|
|
2146
|
+
rsp = client.CreateUser(model)
|
|
1458
2147
|
result = rsp.to_json_string()
|
|
1459
2148
|
try:
|
|
1460
2149
|
json_obj = json.loads(result)
|
|
@@ -1473,7 +2162,7 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
1473
2162
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1474
2163
|
|
|
1475
2164
|
|
|
1476
|
-
def
|
|
2165
|
+
def doDescribeTaskStatus(args, parsed_globals):
|
|
1477
2166
|
g_param = parse_global_arg(parsed_globals)
|
|
1478
2167
|
|
|
1479
2168
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1483,7 +2172,10 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
1483
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
2174
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
2180
|
else:
|
|
1489
2181
|
cred = credential.Credential(
|
|
@@ -1495,18 +2187,18 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
1495
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
2189
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
2191
|
if g_param[OptionsDefine.Language]:
|
|
1500
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1502
2194
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1503
2195
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1504
2196
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1505
|
-
model = models.
|
|
2197
|
+
model = models.DescribeTaskStatusRequest()
|
|
1506
2198
|
model.from_json_string(json.dumps(args))
|
|
1507
2199
|
start_time = time.time()
|
|
1508
2200
|
while True:
|
|
1509
|
-
rsp = client.
|
|
2201
|
+
rsp = client.DescribeTaskStatus(model)
|
|
1510
2202
|
result = rsp.to_json_string()
|
|
1511
2203
|
try:
|
|
1512
2204
|
json_obj = json.loads(result)
|
|
@@ -1525,7 +2217,7 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
1525
2217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1526
2218
|
|
|
1527
2219
|
|
|
1528
|
-
def
|
|
2220
|
+
def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
1529
2221
|
g_param = parse_global_arg(parsed_globals)
|
|
1530
2222
|
|
|
1531
2223
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1535,7 +2227,10 @@ def doCreatePartition(args, parsed_globals):
|
|
|
1535
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
2229
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
2235
|
else:
|
|
1541
2236
|
cred = credential.Credential(
|
|
@@ -1547,18 +2242,18 @@ def doCreatePartition(args, parsed_globals):
|
|
|
1547
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
2244
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
2246
|
if g_param[OptionsDefine.Language]:
|
|
1552
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1554
2249
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1555
2250
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1556
2251
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1557
|
-
model = models.
|
|
2252
|
+
model = models.BatchModifyGroupOffsetsRequest()
|
|
1558
2253
|
model.from_json_string(json.dumps(args))
|
|
1559
2254
|
start_time = time.time()
|
|
1560
2255
|
while True:
|
|
1561
|
-
rsp = client.
|
|
2256
|
+
rsp = client.BatchModifyGroupOffsets(model)
|
|
1562
2257
|
result = rsp.to_json_string()
|
|
1563
2258
|
try:
|
|
1564
2259
|
json_obj = json.loads(result)
|
|
@@ -1577,7 +2272,7 @@ def doCreatePartition(args, parsed_globals):
|
|
|
1577
2272
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
2273
|
|
|
1579
2274
|
|
|
1580
|
-
def
|
|
2275
|
+
def doDeleteAcl(args, parsed_globals):
|
|
1581
2276
|
g_param = parse_global_arg(parsed_globals)
|
|
1582
2277
|
|
|
1583
2278
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1587,7 +2282,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
1587
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
2284
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
2290
|
else:
|
|
1593
2291
|
cred = credential.Credential(
|
|
@@ -1599,18 +2297,18 @@ def doCreateUser(args, parsed_globals):
|
|
|
1599
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
2299
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
2301
|
if g_param[OptionsDefine.Language]:
|
|
1604
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1606
2304
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1607
2305
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1608
2306
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1609
|
-
model = models.
|
|
2307
|
+
model = models.DeleteAclRequest()
|
|
1610
2308
|
model.from_json_string(json.dumps(args))
|
|
1611
2309
|
start_time = time.time()
|
|
1612
2310
|
while True:
|
|
1613
|
-
rsp = client.
|
|
2311
|
+
rsp = client.DeleteAcl(model)
|
|
1614
2312
|
result = rsp.to_json_string()
|
|
1615
2313
|
try:
|
|
1616
2314
|
json_obj = json.loads(result)
|
|
@@ -1629,7 +2327,7 @@ def doCreateUser(args, parsed_globals):
|
|
|
1629
2327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1630
2328
|
|
|
1631
2329
|
|
|
1632
|
-
def
|
|
2330
|
+
def doInstanceScalingDown(args, parsed_globals):
|
|
1633
2331
|
g_param = parse_global_arg(parsed_globals)
|
|
1634
2332
|
|
|
1635
2333
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1639,7 +2337,10 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
1639
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
2339
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
2345
|
else:
|
|
1645
2346
|
cred = credential.Credential(
|
|
@@ -1651,18 +2352,18 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
1651
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
2354
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
2356
|
if g_param[OptionsDefine.Language]:
|
|
1656
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1658
2359
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1659
2360
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1660
2361
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1661
|
-
model = models.
|
|
2362
|
+
model = models.InstanceScalingDownRequest()
|
|
1662
2363
|
model.from_json_string(json.dumps(args))
|
|
1663
2364
|
start_time = time.time()
|
|
1664
2365
|
while True:
|
|
1665
|
-
rsp = client.
|
|
2366
|
+
rsp = client.InstanceScalingDown(model)
|
|
1666
2367
|
result = rsp.to_json_string()
|
|
1667
2368
|
try:
|
|
1668
2369
|
json_obj = json.loads(result)
|
|
@@ -1681,7 +2382,7 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
1681
2382
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1682
2383
|
|
|
1683
2384
|
|
|
1684
|
-
def
|
|
2385
|
+
def doDescribeGroupOffsets(args, parsed_globals):
|
|
1685
2386
|
g_param = parse_global_arg(parsed_globals)
|
|
1686
2387
|
|
|
1687
2388
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1691,7 +2392,10 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
1691
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
2394
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
2400
|
else:
|
|
1697
2401
|
cred = credential.Credential(
|
|
@@ -1703,18 +2407,18 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
1703
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
2409
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
2411
|
if g_param[OptionsDefine.Language]:
|
|
1708
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1710
2414
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1711
2415
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1712
2416
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1713
|
-
model = models.
|
|
2417
|
+
model = models.DescribeGroupOffsetsRequest()
|
|
1714
2418
|
model.from_json_string(json.dumps(args))
|
|
1715
2419
|
start_time = time.time()
|
|
1716
2420
|
while True:
|
|
1717
|
-
rsp = client.
|
|
2421
|
+
rsp = client.DescribeGroupOffsets(model)
|
|
1718
2422
|
result = rsp.to_json_string()
|
|
1719
2423
|
try:
|
|
1720
2424
|
json_obj = json.loads(result)
|
|
@@ -1733,7 +2437,7 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
1733
2437
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1734
2438
|
|
|
1735
2439
|
|
|
1736
|
-
def
|
|
2440
|
+
def doDeleteInstancePre(args, parsed_globals):
|
|
1737
2441
|
g_param = parse_global_arg(parsed_globals)
|
|
1738
2442
|
|
|
1739
2443
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1743,7 +2447,10 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1743
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2449
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2455
|
else:
|
|
1749
2456
|
cred = credential.Credential(
|
|
@@ -1755,18 +2462,18 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1755
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
2464
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
2466
|
if g_param[OptionsDefine.Language]:
|
|
1760
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1762
2469
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1763
2470
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1764
2471
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1765
|
-
model = models.
|
|
2472
|
+
model = models.DeleteInstancePreRequest()
|
|
1766
2473
|
model.from_json_string(json.dumps(args))
|
|
1767
2474
|
start_time = time.time()
|
|
1768
2475
|
while True:
|
|
1769
|
-
rsp = client.
|
|
2476
|
+
rsp = client.DeleteInstancePre(model)
|
|
1770
2477
|
result = rsp.to_json_string()
|
|
1771
2478
|
try:
|
|
1772
2479
|
json_obj = json.loads(result)
|
|
@@ -1785,7 +2492,7 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1785
2492
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1786
2493
|
|
|
1787
2494
|
|
|
1788
|
-
def
|
|
2495
|
+
def doDescribeInstanceAttributes(args, parsed_globals):
|
|
1789
2496
|
g_param = parse_global_arg(parsed_globals)
|
|
1790
2497
|
|
|
1791
2498
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1795,7 +2502,10 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
1795
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2504
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2510
|
else:
|
|
1801
2511
|
cred = credential.Credential(
|
|
@@ -1807,18 +2517,18 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
1807
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
2519
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
2521
|
if g_param[OptionsDefine.Language]:
|
|
1812
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1814
2524
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1815
2525
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1816
2526
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1817
|
-
model = models.
|
|
2527
|
+
model = models.DescribeInstanceAttributesRequest()
|
|
1818
2528
|
model.from_json_string(json.dumps(args))
|
|
1819
2529
|
start_time = time.time()
|
|
1820
2530
|
while True:
|
|
1821
|
-
rsp = client.
|
|
2531
|
+
rsp = client.DescribeInstanceAttributes(model)
|
|
1822
2532
|
result = rsp.to_json_string()
|
|
1823
2533
|
try:
|
|
1824
2534
|
json_obj = json.loads(result)
|
|
@@ -1837,7 +2547,7 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
1837
2547
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1838
2548
|
|
|
1839
2549
|
|
|
1840
|
-
def
|
|
2550
|
+
def doDescribeInstancesDetail(args, parsed_globals):
|
|
1841
2551
|
g_param = parse_global_arg(parsed_globals)
|
|
1842
2552
|
|
|
1843
2553
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1847,7 +2557,10 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
1847
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2559
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2565
|
else:
|
|
1853
2566
|
cred = credential.Credential(
|
|
@@ -1859,18 +2572,18 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
1859
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2574
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2576
|
if g_param[OptionsDefine.Language]:
|
|
1864
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1866
2579
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1867
2580
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1868
2581
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1869
|
-
model = models.
|
|
2582
|
+
model = models.DescribeInstancesDetailRequest()
|
|
1870
2583
|
model.from_json_string(json.dumps(args))
|
|
1871
2584
|
start_time = time.time()
|
|
1872
2585
|
while True:
|
|
1873
|
-
rsp = client.
|
|
2586
|
+
rsp = client.DescribeInstancesDetail(model)
|
|
1874
2587
|
result = rsp.to_json_string()
|
|
1875
2588
|
try:
|
|
1876
2589
|
json_obj = json.loads(result)
|
|
@@ -1889,7 +2602,7 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
1889
2602
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
2603
|
|
|
1891
2604
|
|
|
1892
|
-
def
|
|
2605
|
+
def doBatchCreateAcl(args, parsed_globals):
|
|
1893
2606
|
g_param = parse_global_arg(parsed_globals)
|
|
1894
2607
|
|
|
1895
2608
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1899,7 +2612,10 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
1899
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2614
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2620
|
else:
|
|
1905
2621
|
cred = credential.Credential(
|
|
@@ -1911,18 +2627,18 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
1911
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2629
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2631
|
if g_param[OptionsDefine.Language]:
|
|
1916
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1918
2634
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1919
2635
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1920
2636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1921
|
-
model = models.
|
|
2637
|
+
model = models.BatchCreateAclRequest()
|
|
1922
2638
|
model.from_json_string(json.dumps(args))
|
|
1923
2639
|
start_time = time.time()
|
|
1924
2640
|
while True:
|
|
1925
|
-
rsp = client.
|
|
2641
|
+
rsp = client.BatchCreateAcl(model)
|
|
1926
2642
|
result = rsp.to_json_string()
|
|
1927
2643
|
try:
|
|
1928
2644
|
json_obj = json.loads(result)
|
|
@@ -1941,7 +2657,7 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
1941
2657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1942
2658
|
|
|
1943
2659
|
|
|
1944
|
-
def
|
|
2660
|
+
def doDeleteAclRule(args, parsed_globals):
|
|
1945
2661
|
g_param = parse_global_arg(parsed_globals)
|
|
1946
2662
|
|
|
1947
2663
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1951,7 +2667,10 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1951
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2669
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2675
|
else:
|
|
1957
2676
|
cred = credential.Credential(
|
|
@@ -1963,18 +2682,18 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1963
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2684
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2686
|
if g_param[OptionsDefine.Language]:
|
|
1968
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1970
2689
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1971
2690
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1972
2691
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1973
|
-
model = models.
|
|
2692
|
+
model = models.DeleteAclRuleRequest()
|
|
1974
2693
|
model.from_json_string(json.dumps(args))
|
|
1975
2694
|
start_time = time.time()
|
|
1976
2695
|
while True:
|
|
1977
|
-
rsp = client.
|
|
2696
|
+
rsp = client.DeleteAclRule(model)
|
|
1978
2697
|
result = rsp.to_json_string()
|
|
1979
2698
|
try:
|
|
1980
2699
|
json_obj = json.loads(result)
|
|
@@ -1993,7 +2712,7 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1993
2712
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1994
2713
|
|
|
1995
2714
|
|
|
1996
|
-
def
|
|
2715
|
+
def doModifyAclRule(args, parsed_globals):
|
|
1997
2716
|
g_param = parse_global_arg(parsed_globals)
|
|
1998
2717
|
|
|
1999
2718
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2003,7 +2722,10 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
2003
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2724
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2730
|
else:
|
|
2009
2731
|
cred = credential.Credential(
|
|
@@ -2015,18 +2737,18 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
2015
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2739
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2741
|
if g_param[OptionsDefine.Language]:
|
|
2020
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2022
2744
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2023
2745
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2024
2746
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2025
|
-
model = models.
|
|
2747
|
+
model = models.ModifyAclRuleRequest()
|
|
2026
2748
|
model.from_json_string(json.dumps(args))
|
|
2027
2749
|
start_time = time.time()
|
|
2028
2750
|
while True:
|
|
2029
|
-
rsp = client.
|
|
2751
|
+
rsp = client.ModifyAclRule(model)
|
|
2030
2752
|
result = rsp.to_json_string()
|
|
2031
2753
|
try:
|
|
2032
2754
|
json_obj = json.loads(result)
|
|
@@ -2045,7 +2767,7 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
2045
2767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2046
2768
|
|
|
2047
2769
|
|
|
2048
|
-
def
|
|
2770
|
+
def doDeleteUser(args, parsed_globals):
|
|
2049
2771
|
g_param = parse_global_arg(parsed_globals)
|
|
2050
2772
|
|
|
2051
2773
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2055,7 +2777,10 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2055
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2779
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2785
|
else:
|
|
2061
2786
|
cred = credential.Credential(
|
|
@@ -2067,18 +2792,18 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2067
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2794
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2796
|
if g_param[OptionsDefine.Language]:
|
|
2072
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2074
2799
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2075
2800
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2076
2801
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2077
|
-
model = models.
|
|
2802
|
+
model = models.DeleteUserRequest()
|
|
2078
2803
|
model.from_json_string(json.dumps(args))
|
|
2079
2804
|
start_time = time.time()
|
|
2080
2805
|
while True:
|
|
2081
|
-
rsp = client.
|
|
2806
|
+
rsp = client.DeleteUser(model)
|
|
2082
2807
|
result = rsp.to_json_string()
|
|
2083
2808
|
try:
|
|
2084
2809
|
json_obj = json.loads(result)
|
|
@@ -2097,7 +2822,7 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2097
2822
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2098
2823
|
|
|
2099
2824
|
|
|
2100
|
-
def
|
|
2825
|
+
def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
2101
2826
|
g_param = parse_global_arg(parsed_globals)
|
|
2102
2827
|
|
|
2103
2828
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2107,7 +2832,10 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
2107
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2834
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2840
|
else:
|
|
2113
2841
|
cred = credential.Credential(
|
|
@@ -2119,18 +2847,18 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
2119
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2849
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2851
|
if g_param[OptionsDefine.Language]:
|
|
2124
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2126
2854
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2127
2855
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2128
2856
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2129
|
-
model = models.
|
|
2857
|
+
model = models.DescribeTopicSyncReplicaRequest()
|
|
2130
2858
|
model.from_json_string(json.dumps(args))
|
|
2131
2859
|
start_time = time.time()
|
|
2132
2860
|
while True:
|
|
2133
|
-
rsp = client.
|
|
2861
|
+
rsp = client.DescribeTopicSyncReplica(model)
|
|
2134
2862
|
result = rsp.to_json_string()
|
|
2135
2863
|
try:
|
|
2136
2864
|
json_obj = json.loads(result)
|
|
@@ -2149,7 +2877,7 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
2149
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2150
2878
|
|
|
2151
2879
|
|
|
2152
|
-
def
|
|
2880
|
+
def doDescribeTopicAttributes(args, parsed_globals):
|
|
2153
2881
|
g_param = parse_global_arg(parsed_globals)
|
|
2154
2882
|
|
|
2155
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2159,7 +2887,10 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2159
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2889
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2895
|
else:
|
|
2165
2896
|
cred = credential.Credential(
|
|
@@ -2171,18 +2902,18 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2171
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2904
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2906
|
if g_param[OptionsDefine.Language]:
|
|
2176
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2178
2909
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2179
2910
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2180
2911
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2181
|
-
model = models.
|
|
2912
|
+
model = models.DescribeTopicAttributesRequest()
|
|
2182
2913
|
model.from_json_string(json.dumps(args))
|
|
2183
2914
|
start_time = time.time()
|
|
2184
2915
|
while True:
|
|
2185
|
-
rsp = client.
|
|
2916
|
+
rsp = client.DescribeTopicAttributes(model)
|
|
2186
2917
|
result = rsp.to_json_string()
|
|
2187
2918
|
try:
|
|
2188
2919
|
json_obj = json.loads(result)
|
|
@@ -2201,7 +2932,7 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2201
2932
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2202
2933
|
|
|
2203
2934
|
|
|
2204
|
-
def
|
|
2935
|
+
def doFetchMessageListByTimestamp(args, parsed_globals):
|
|
2205
2936
|
g_param = parse_global_arg(parsed_globals)
|
|
2206
2937
|
|
|
2207
2938
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2211,7 +2942,10 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2211
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2944
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2950
|
else:
|
|
2217
2951
|
cred = credential.Credential(
|
|
@@ -2223,18 +2957,18 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2223
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2959
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2961
|
if g_param[OptionsDefine.Language]:
|
|
2228
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2230
2964
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2231
2965
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2232
2966
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2233
|
-
model = models.
|
|
2967
|
+
model = models.FetchMessageListByTimestampRequest()
|
|
2234
2968
|
model.from_json_string(json.dumps(args))
|
|
2235
2969
|
start_time = time.time()
|
|
2236
2970
|
while True:
|
|
2237
|
-
rsp = client.
|
|
2971
|
+
rsp = client.FetchMessageListByTimestamp(model)
|
|
2238
2972
|
result = rsp.to_json_string()
|
|
2239
2973
|
try:
|
|
2240
2974
|
json_obj = json.loads(result)
|
|
@@ -2253,7 +2987,7 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2253
2987
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2254
2988
|
|
|
2255
2989
|
|
|
2256
|
-
def
|
|
2990
|
+
def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
2257
2991
|
g_param = parse_global_arg(parsed_globals)
|
|
2258
2992
|
|
|
2259
2993
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2263,7 +2997,10 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2263
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2999
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
3005
|
else:
|
|
2269
3006
|
cred = credential.Credential(
|
|
@@ -2275,18 +3012,18 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2275
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
3014
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
3016
|
if g_param[OptionsDefine.Language]:
|
|
2280
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2282
3019
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2283
3020
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2284
3021
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2285
|
-
model = models.
|
|
3022
|
+
model = models.DescribeTopicProduceConnectionRequest()
|
|
2286
3023
|
model.from_json_string(json.dumps(args))
|
|
2287
3024
|
start_time = time.time()
|
|
2288
3025
|
while True:
|
|
2289
|
-
rsp = client.
|
|
3026
|
+
rsp = client.DescribeTopicProduceConnection(model)
|
|
2290
3027
|
result = rsp.to_json_string()
|
|
2291
3028
|
try:
|
|
2292
3029
|
json_obj = json.loads(result)
|
|
@@ -2305,7 +3042,7 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2305
3042
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2306
3043
|
|
|
2307
3044
|
|
|
2308
|
-
def
|
|
3045
|
+
def doCreatePostPaidInstance(args, parsed_globals):
|
|
2309
3046
|
g_param = parse_global_arg(parsed_globals)
|
|
2310
3047
|
|
|
2311
3048
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2315,7 +3052,10 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
2315
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
3054
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
3060
|
else:
|
|
2321
3061
|
cred = credential.Credential(
|
|
@@ -2327,18 +3067,18 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
2327
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
3069
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
3071
|
if g_param[OptionsDefine.Language]:
|
|
2332
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2334
3074
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2335
3075
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2336
3076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2337
|
-
model = models.
|
|
3077
|
+
model = models.CreatePostPaidInstanceRequest()
|
|
2338
3078
|
model.from_json_string(json.dumps(args))
|
|
2339
3079
|
start_time = time.time()
|
|
2340
3080
|
while True:
|
|
2341
|
-
rsp = client.
|
|
3081
|
+
rsp = client.CreatePostPaidInstance(model)
|
|
2342
3082
|
result = rsp.to_json_string()
|
|
2343
3083
|
try:
|
|
2344
3084
|
json_obj = json.loads(result)
|
|
@@ -2357,7 +3097,7 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
2357
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2358
3098
|
|
|
2359
3099
|
|
|
2360
|
-
def
|
|
3100
|
+
def doCreateAclRule(args, parsed_globals):
|
|
2361
3101
|
g_param = parse_global_arg(parsed_globals)
|
|
2362
3102
|
|
|
2363
3103
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2367,7 +3107,10 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
2367
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
3109
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
3115
|
else:
|
|
2373
3116
|
cred = credential.Credential(
|
|
@@ -2379,18 +3122,18 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
2379
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
3124
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
3126
|
if g_param[OptionsDefine.Language]:
|
|
2384
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2386
3129
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2387
3130
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2388
3131
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2389
|
-
model = models.
|
|
3132
|
+
model = models.CreateAclRuleRequest()
|
|
2390
3133
|
model.from_json_string(json.dumps(args))
|
|
2391
3134
|
start_time = time.time()
|
|
2392
3135
|
while True:
|
|
2393
|
-
rsp = client.
|
|
3136
|
+
rsp = client.CreateAclRule(model)
|
|
2394
3137
|
result = rsp.to_json_string()
|
|
2395
3138
|
try:
|
|
2396
3139
|
json_obj = json.loads(result)
|
|
@@ -2409,7 +3152,7 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
2409
3152
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2410
3153
|
|
|
2411
3154
|
|
|
2412
|
-
def
|
|
3155
|
+
def doModifyInstanceAttributes(args, parsed_globals):
|
|
2413
3156
|
g_param = parse_global_arg(parsed_globals)
|
|
2414
3157
|
|
|
2415
3158
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2419,7 +3162,10 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2419
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
3164
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
3170
|
else:
|
|
2425
3171
|
cred = credential.Credential(
|
|
@@ -2431,18 +3177,18 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2431
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
3179
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
3181
|
if g_param[OptionsDefine.Language]:
|
|
2436
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2438
3184
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2439
3185
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2440
3186
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2441
|
-
model = models.
|
|
3187
|
+
model = models.ModifyInstanceAttributesRequest()
|
|
2442
3188
|
model.from_json_string(json.dumps(args))
|
|
2443
3189
|
start_time = time.time()
|
|
2444
3190
|
while True:
|
|
2445
|
-
rsp = client.
|
|
3191
|
+
rsp = client.ModifyInstanceAttributes(model)
|
|
2446
3192
|
result = rsp.to_json_string()
|
|
2447
3193
|
try:
|
|
2448
3194
|
json_obj = json.loads(result)
|
|
@@ -2461,7 +3207,7 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2461
3207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2462
3208
|
|
|
2463
3209
|
|
|
2464
|
-
def
|
|
3210
|
+
def doDescribeCkafkaZone(args, parsed_globals):
|
|
2465
3211
|
g_param = parse_global_arg(parsed_globals)
|
|
2466
3212
|
|
|
2467
3213
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2471,7 +3217,10 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2471
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
3219
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
3225
|
else:
|
|
2477
3226
|
cred = credential.Credential(
|
|
@@ -2483,18 +3232,18 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2483
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
3234
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
3236
|
if g_param[OptionsDefine.Language]:
|
|
2488
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2490
3239
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2491
3240
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2492
3241
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2493
|
-
model = models.
|
|
3242
|
+
model = models.DescribeCkafkaZoneRequest()
|
|
2494
3243
|
model.from_json_string(json.dumps(args))
|
|
2495
3244
|
start_time = time.time()
|
|
2496
3245
|
while True:
|
|
2497
|
-
rsp = client.
|
|
3246
|
+
rsp = client.DescribeCkafkaZone(model)
|
|
2498
3247
|
result = rsp.to_json_string()
|
|
2499
3248
|
try:
|
|
2500
3249
|
json_obj = json.loads(result)
|
|
@@ -2513,7 +3262,7 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2513
3262
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2514
3263
|
|
|
2515
3264
|
|
|
2516
|
-
def
|
|
3265
|
+
def doDescribeRegion(args, parsed_globals):
|
|
2517
3266
|
g_param = parse_global_arg(parsed_globals)
|
|
2518
3267
|
|
|
2519
3268
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2523,7 +3272,10 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2523
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
3274
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
3280
|
else:
|
|
2529
3281
|
cred = credential.Credential(
|
|
@@ -2535,18 +3287,18 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2535
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
3289
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
3291
|
if g_param[OptionsDefine.Language]:
|
|
2540
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2542
3294
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2543
3295
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2544
3296
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2545
|
-
model = models.
|
|
3297
|
+
model = models.DescribeRegionRequest()
|
|
2546
3298
|
model.from_json_string(json.dumps(args))
|
|
2547
3299
|
start_time = time.time()
|
|
2548
3300
|
while True:
|
|
2549
|
-
rsp = client.
|
|
3301
|
+
rsp = client.DescribeRegion(model)
|
|
2550
3302
|
result = rsp.to_json_string()
|
|
2551
3303
|
try:
|
|
2552
3304
|
json_obj = json.loads(result)
|
|
@@ -2565,7 +3317,7 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2565
3317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2566
3318
|
|
|
2567
3319
|
|
|
2568
|
-
def
|
|
3320
|
+
def doDescribeTopic(args, parsed_globals):
|
|
2569
3321
|
g_param = parse_global_arg(parsed_globals)
|
|
2570
3322
|
|
|
2571
3323
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2575,7 +3327,10 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
2575
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
3329
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
3335
|
else:
|
|
2581
3336
|
cred = credential.Credential(
|
|
@@ -2587,18 +3342,18 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
2587
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
3344
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
3346
|
if g_param[OptionsDefine.Language]:
|
|
2592
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2594
3349
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2595
3350
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2596
3351
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2597
|
-
model = models.
|
|
3352
|
+
model = models.DescribeTopicRequest()
|
|
2598
3353
|
model.from_json_string(json.dumps(args))
|
|
2599
3354
|
start_time = time.time()
|
|
2600
3355
|
while True:
|
|
2601
|
-
rsp = client.
|
|
3356
|
+
rsp = client.DescribeTopic(model)
|
|
2602
3357
|
result = rsp.to_json_string()
|
|
2603
3358
|
try:
|
|
2604
3359
|
json_obj = json.loads(result)
|
|
@@ -2617,7 +3372,7 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
2617
3372
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2618
3373
|
|
|
2619
3374
|
|
|
2620
|
-
def
|
|
3375
|
+
def doModifyInstancePre(args, parsed_globals):
|
|
2621
3376
|
g_param = parse_global_arg(parsed_globals)
|
|
2622
3377
|
|
|
2623
3378
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2627,7 +3382,10 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
2627
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
3384
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
3390
|
else:
|
|
2633
3391
|
cred = credential.Credential(
|
|
@@ -2639,18 +3397,18 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
2639
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
3399
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
3401
|
if g_param[OptionsDefine.Language]:
|
|
2644
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2646
3404
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2647
3405
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2648
3406
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2649
|
-
model = models.
|
|
3407
|
+
model = models.ModifyInstancePreRequest()
|
|
2650
3408
|
model.from_json_string(json.dumps(args))
|
|
2651
3409
|
start_time = time.time()
|
|
2652
3410
|
while True:
|
|
2653
|
-
rsp = client.
|
|
3411
|
+
rsp = client.ModifyInstancePre(model)
|
|
2654
3412
|
result = rsp.to_json_string()
|
|
2655
3413
|
try:
|
|
2656
3414
|
json_obj = json.loads(result)
|
|
@@ -2679,7 +3437,10 @@ def doDeleteTopic(args, parsed_globals):
|
|
|
2679
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
3439
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3445
|
else:
|
|
2685
3446
|
cred = credential.Credential(
|
|
@@ -2691,7 +3452,7 @@ def doDeleteTopic(args, parsed_globals):
|
|
|
2691
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
3454
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
3456
|
if g_param[OptionsDefine.Language]:
|
|
2696
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +3492,10 @@ def doInquireCkafkaPrice(args, parsed_globals):
|
|
|
2731
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3494
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3500
|
else:
|
|
2737
3501
|
cred = credential.Credential(
|
|
@@ -2743,7 +3507,7 @@ def doInquireCkafkaPrice(args, parsed_globals):
|
|
|
2743
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3509
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3511
|
if g_param[OptionsDefine.Language]:
|
|
2748
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +3547,10 @@ def doModifyTopicAttributes(args, parsed_globals):
|
|
|
2783
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3549
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3555
|
else:
|
|
2789
3556
|
cred = credential.Credential(
|
|
@@ -2795,7 +3562,7 @@ def doModifyTopicAttributes(args, parsed_globals):
|
|
|
2795
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3564
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3566
|
if g_param[OptionsDefine.Language]:
|
|
2800
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2840,53 +3607,64 @@ ACTION_MAP = {
|
|
|
2840
3607
|
"DescribeGroupInfo": doDescribeGroupInfo,
|
|
2841
3608
|
"CreateConsumer": doCreateConsumer,
|
|
2842
3609
|
"CreateAcl": doCreateAcl,
|
|
2843
|
-
"
|
|
3610
|
+
"DescribeTypeInstances": doDescribeTypeInstances,
|
|
3611
|
+
"DescribeDatahubTopics": doDescribeDatahubTopics,
|
|
2844
3612
|
"DescribeAclRule": doDescribeAclRule,
|
|
2845
3613
|
"CreateTopic": doCreateTopic,
|
|
2846
|
-
"
|
|
3614
|
+
"DescribeSecurityGroupRoutes": doDescribeSecurityGroupRoutes,
|
|
2847
3615
|
"BatchModifyTopicAttributes": doBatchModifyTopicAttributes,
|
|
2848
3616
|
"DeleteRoute": doDeleteRoute,
|
|
2849
3617
|
"SendMessage": doSendMessage,
|
|
2850
3618
|
"DescribeUser": doDescribeUser,
|
|
2851
|
-
"CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
|
|
2852
3619
|
"DescribeGroup": doDescribeGroup,
|
|
3620
|
+
"CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
|
|
3621
|
+
"DescribeCkafkaVersion": doDescribeCkafkaVersion,
|
|
2853
3622
|
"ModifyGroupOffsets": doModifyGroupOffsets,
|
|
3623
|
+
"UpgradeBrokerVersion": doUpgradeBrokerVersion,
|
|
2854
3624
|
"DescribeInstances": doDescribeInstances,
|
|
2855
|
-
"
|
|
3625
|
+
"DescribeCvmInfo": doDescribeCvmInfo,
|
|
3626
|
+
"DescribeDatahubTopic": doDescribeDatahubTopic,
|
|
3627
|
+
"CreateRoute": doCreateRoute,
|
|
3628
|
+
"DeleteGroup": doDeleteGroup,
|
|
2856
3629
|
"ModifyDatahubTopic": doModifyDatahubTopic,
|
|
2857
3630
|
"FetchMessageListByOffset": doFetchMessageListByOffset,
|
|
2858
3631
|
"CreateDatahubTopic": doCreateDatahubTopic,
|
|
3632
|
+
"DeleteInstancePost": doDeleteInstancePost,
|
|
2859
3633
|
"DescribeACL": doDescribeACL,
|
|
2860
|
-
"DescribeDatahubTopics": doDescribeDatahubTopics,
|
|
2861
3634
|
"DescribeTopicDetail": doDescribeTopicDetail,
|
|
3635
|
+
"CreateInstancePre": doCreateInstancePre,
|
|
2862
3636
|
"FetchMessageByOffset": doFetchMessageByOffset,
|
|
2863
3637
|
"DeleteTopicIpWhiteList": doDeleteTopicIpWhiteList,
|
|
2864
3638
|
"ModifyPassword": doModifyPassword,
|
|
2865
3639
|
"DescribeConsumerGroup": doDescribeConsumerGroup,
|
|
2866
3640
|
"DescribeTopicSubscribeGroup": doDescribeTopicSubscribeGroup,
|
|
3641
|
+
"ModifyRoutineMaintenanceTask": doModifyRoutineMaintenanceTask,
|
|
2867
3642
|
"DeleteRouteTriggerTime": doDeleteRouteTriggerTime,
|
|
2868
3643
|
"CreatePartition": doCreatePartition,
|
|
2869
3644
|
"CreateUser": doCreateUser,
|
|
2870
3645
|
"DescribeTaskStatus": doDescribeTaskStatus,
|
|
2871
3646
|
"BatchModifyGroupOffsets": doBatchModifyGroupOffsets,
|
|
2872
3647
|
"DeleteAcl": doDeleteAcl,
|
|
2873
|
-
"
|
|
3648
|
+
"InstanceScalingDown": doInstanceScalingDown,
|
|
2874
3649
|
"DescribeGroupOffsets": doDescribeGroupOffsets,
|
|
2875
3650
|
"DeleteInstancePre": doDeleteInstancePre,
|
|
2876
3651
|
"DescribeInstanceAttributes": doDescribeInstanceAttributes,
|
|
2877
3652
|
"DescribeInstancesDetail": doDescribeInstancesDetail,
|
|
2878
3653
|
"BatchCreateAcl": doBatchCreateAcl,
|
|
3654
|
+
"DeleteAclRule": doDeleteAclRule,
|
|
2879
3655
|
"ModifyAclRule": doModifyAclRule,
|
|
2880
3656
|
"DeleteUser": doDeleteUser,
|
|
2881
3657
|
"DescribeTopicSyncReplica": doDescribeTopicSyncReplica,
|
|
2882
3658
|
"DescribeTopicAttributes": doDescribeTopicAttributes,
|
|
3659
|
+
"FetchMessageListByTimestamp": doFetchMessageListByTimestamp,
|
|
2883
3660
|
"DescribeTopicProduceConnection": doDescribeTopicProduceConnection,
|
|
2884
3661
|
"CreatePostPaidInstance": doCreatePostPaidInstance,
|
|
2885
3662
|
"CreateAclRule": doCreateAclRule,
|
|
2886
|
-
"
|
|
3663
|
+
"ModifyInstanceAttributes": doModifyInstanceAttributes,
|
|
2887
3664
|
"DescribeCkafkaZone": doDescribeCkafkaZone,
|
|
2888
3665
|
"DescribeRegion": doDescribeRegion,
|
|
2889
3666
|
"DescribeTopic": doDescribeTopic,
|
|
3667
|
+
"ModifyInstancePre": doModifyInstancePre,
|
|
2890
3668
|
"DeleteTopic": doDeleteTopic,
|
|
2891
3669
|
"InquireCkafkaPrice": doInquireCkafkaPrice,
|
|
2892
3670
|
"ModifyTopicAttributes": doModifyTopicAttributes,
|