tccli-intl-en 3.0.1168.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (294) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/plugins/sso/__init__.py +14 -0
  4. tccli/plugins/sso/login.py +23 -6
  5. tccli/plugins/sso/texts.py +4 -0
  6. tccli/services/__init__.py +49 -2
  7. tccli/services/advisor/advisor_client.py +10 -4
  8. tccli/services/ai3d/__init__.py +4 -0
  9. tccli/services/ai3d/ai3d_client.py +266 -0
  10. tccli/services/ai3d/v20250513/api.json +264 -0
  11. tccli/services/ai3d/v20250513/examples.json +20 -0
  12. tccli/services/aiart/aiart_client.py +5 -2
  13. tccli/services/ams/ams_client.py +20 -8
  14. tccli/services/antiddos/antiddos_client.py +350 -140
  15. tccli/services/apigateway/apigateway_client.py +465 -186
  16. tccli/services/apm/apm_client.py +835 -68
  17. tccli/services/apm/v20210622/api.json +3936 -1145
  18. tccli/services/apm/v20210622/examples.json +133 -23
  19. tccli/services/asr/asr_client.py +10 -4
  20. tccli/services/autoscaling/autoscaling_client.py +341 -114
  21. tccli/services/autoscaling/v20180419/api.json +514 -333
  22. tccli/services/autoscaling/v20180419/examples.json +46 -38
  23. tccli/services/batch/batch_client.py +140 -56
  24. tccli/services/bi/__init__.py +4 -0
  25. tccli/services/bi/bi_client.py +1498 -0
  26. tccli/services/bi/v20220105/api.json +5769 -0
  27. tccli/services/bi/v20220105/examples.json +215 -0
  28. tccli/services/billing/billing_client.py +1055 -134
  29. tccli/services/billing/v20180709/api.json +1654 -243
  30. tccli/services/billing/v20180709/examples.json +169 -25
  31. tccli/services/cam/cam_client.py +405 -162
  32. tccli/services/captcha/captcha_client.py +5 -2
  33. tccli/services/captcha/v20190722/api.json +16 -6
  34. tccli/services/captcha/v20190722/examples.json +3 -3
  35. tccli/services/car/car_client.py +165 -66
  36. tccli/services/cbs/cbs_client.py +190 -76
  37. tccli/services/ccc/ccc_client.py +1167 -268
  38. tccli/services/ccc/v20200210/api.json +2263 -202
  39. tccli/services/ccc/v20200210/examples.json +116 -12
  40. tccli/services/cdb/cdb_client.py +665 -266
  41. tccli/services/cdb/v20170320/api.json +426 -173
  42. tccli/services/cdb/v20170320/examples.json +6 -6
  43. tccli/services/cdc/cdc_client.py +100 -40
  44. tccli/services/cdc/v20201214/api.json +2 -2
  45. tccli/services/cdc/v20201214/examples.json +4 -4
  46. tccli/services/cdn/cdn_client.py +220 -88
  47. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  48. tccli/services/cdwpg/cdwpg_client.py +120 -48
  49. tccli/services/cdz/__init__.py +4 -0
  50. tccli/services/cdz/cdz_client.py +210 -0
  51. tccli/services/cdz/v20221123/api.json +233 -0
  52. tccli/services/cdz/v20221123/examples.json +12 -0
  53. tccli/services/cfg/cfg_client.py +80 -32
  54. tccli/services/cfg/v20210820/api.json +30 -10
  55. tccli/services/cfg/v20210820/examples.json +1 -1
  56. tccli/services/cfs/cfs_client.py +195 -78
  57. tccli/services/cfw/cfw_client.py +330 -132
  58. tccli/services/chdfs/chdfs_client.py +145 -58
  59. tccli/services/ciam/ciam_client.py +80 -32
  60. tccli/services/ckafka/ckafka_client.py +1033 -255
  61. tccli/services/ckafka/v20190819/api.json +3378 -1681
  62. tccli/services/ckafka/v20190819/examples.json +254 -160
  63. tccli/services/clb/clb_client.py +1054 -469
  64. tccli/services/clb/v20180317/api.json +2307 -1024
  65. tccli/services/clb/v20180317/examples.json +186 -126
  66. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  67. tccli/services/cls/cls_client.py +434 -173
  68. tccli/services/cmq/cmq_client.py +14 -803
  69. tccli/services/cmq/v20190304/api.json +173 -1367
  70. tccli/services/cmq/v20190304/examples.json +0 -120
  71. tccli/services/config/config_client.py +30 -12
  72. tccli/services/controlcenter/controlcenter_client.py +229 -2
  73. tccli/services/controlcenter/v20230110/api.json +528 -5
  74. tccli/services/controlcenter/v20230110/examples.json +32 -0
  75. tccli/services/csip/csip_client.py +339 -78
  76. tccli/services/csip/v20221121/api.json +1011 -38
  77. tccli/services/csip/v20221121/examples.json +24 -0
  78. tccli/services/ctsdb/__init__.py +4 -0
  79. tccli/services/ctsdb/ctsdb_client.py +266 -0
  80. tccli/services/ctsdb/v20230202/api.json +677 -0
  81. tccli/services/ctsdb/v20230202/examples.json +20 -0
  82. tccli/services/cvm/cvm_client.py +706 -189
  83. tccli/services/cvm/v20170312/api.json +1141 -510
  84. tccli/services/cvm/v20170312/examples.json +174 -128
  85. tccli/services/cwp/cwp_client.py +2325 -930
  86. tccli/services/cynosdb/cynosdb_client.py +3051 -575
  87. tccli/services/cynosdb/v20190107/api.json +14074 -7139
  88. tccli/services/cynosdb/v20190107/examples.json +597 -287
  89. tccli/services/dataintegration/dataintegration_client.py +5 -2
  90. tccli/services/dayu/dayu_client.py +515 -206
  91. tccli/services/dbbrain/dbbrain_client.py +210 -84
  92. tccli/services/dc/dc_client.py +90 -36
  93. tccli/services/dcdb/dcdb_client.py +310 -124
  94. tccli/services/dlc/dlc_client.py +859 -214
  95. tccli/services/dlc/v20210125/api.json +637 -13
  96. tccli/services/dlc/v20210125/examples.json +48 -0
  97. tccli/services/dms/dms_client.py +10 -4
  98. tccli/services/dnspod/dnspod_client.py +390 -111
  99. tccli/services/dnspod/v20210323/api.json +196 -0
  100. tccli/services/dnspod/v20210323/examples.json +24 -0
  101. tccli/services/domain/domain_client.py +120 -48
  102. tccli/services/dts/dts_client.py +415 -166
  103. tccli/services/eb/eb_client.py +130 -52
  104. tccli/services/ecdn/ecdn_client.py +75 -30
  105. tccli/services/ecm/ecm_client.py +620 -248
  106. tccli/services/eiam/eiam_client.py +200 -80
  107. tccli/services/emr/emr_client.py +3104 -117
  108. tccli/services/emr/v20190103/api.json +15311 -4361
  109. tccli/services/emr/v20190103/examples.json +452 -42
  110. tccli/services/es/es_client.py +105 -42
  111. tccli/services/facefusion/facefusion_client.py +15 -6
  112. tccli/services/faceid/faceid_client.py +95 -38
  113. tccli/services/faceid/v20180301/api.json +172 -45
  114. tccli/services/faceid/v20180301/examples.json +3 -3
  115. tccli/services/gaap/gaap_client.py +440 -176
  116. tccli/services/gme/gme_client.py +50 -20
  117. tccli/services/gpm/gpm_client.py +90 -36
  118. tccli/services/gse/gse_client.py +110 -44
  119. tccli/services/gwlb/gwlb_client.py +90 -36
  120. tccli/services/hunyuan/__init__.py +4 -0
  121. tccli/services/hunyuan/hunyuan_client.py +266 -0
  122. tccli/services/hunyuan/v20230901/api.json +270 -0
  123. tccli/services/hunyuan/v20230901/examples.json +20 -0
  124. tccli/services/iai/iai_client.py +145 -58
  125. tccli/services/iai/v20200303/api.json +187 -51
  126. tccli/services/iai/v20200303/examples.json +30 -12
  127. tccli/services/iap/iap_client.py +30 -12
  128. tccli/services/ims/ims_client.py +5 -2
  129. tccli/services/ims/v20201229/api.json +133 -141
  130. tccli/services/ims/v20201229/examples.json +3 -3
  131. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +516 -72
  132. tccli/services/intlpartnersmgt/v20220928/api.json +976 -60
  133. tccli/services/intlpartnersmgt/v20220928/examples.json +50 -2
  134. tccli/services/iotcloud/iotcloud_client.py +100 -40
  135. tccli/services/iotcloud/v20210408/api.json +216 -107
  136. tccli/services/iotcloud/v20210408/examples.json +9 -9
  137. tccli/services/ip/ip_client.py +30 -12
  138. tccli/services/kms/kms_client.py +1226 -227
  139. tccli/services/kms/v20190118/api.json +1562 -144
  140. tccli/services/kms/v20190118/examples.json +204 -78
  141. tccli/services/lcic/lcic_client.py +265 -106
  142. tccli/services/lighthouse/lighthouse_client.py +370 -148
  143. tccli/services/lighthouse/v20200324/api.json +14 -14
  144. tccli/services/lighthouse/v20200324/examples.json +5 -5
  145. tccli/services/live/live_client.py +804 -232
  146. tccli/services/live/v20180801/api.json +272 -0
  147. tccli/services/live/v20180801/examples.json +32 -0
  148. tccli/services/lke/__init__.py +4 -0
  149. tccli/services/lke/lke_client.py +5194 -0
  150. tccli/services/lke/v20231130/api.json +14803 -0
  151. tccli/services/lke/v20231130/examples.json +736 -0
  152. tccli/services/lkeap/__init__.py +4 -0
  153. tccli/services/lkeap/lkeap_client.py +602 -0
  154. tccli/services/lkeap/v20240522/api.json +953 -0
  155. tccli/services/lkeap/v20240522/examples.json +92 -0
  156. tccli/services/mariadb/mariadb_client.py +250 -100
  157. tccli/services/mdc/mdc_client.py +90 -36
  158. tccli/services/mdl/mdl_client.py +402 -82
  159. tccli/services/mdl/v20200326/api.json +1144 -58
  160. tccli/services/mdl/v20200326/examples.json +48 -16
  161. tccli/services/mdp/mdp_client.py +785 -122
  162. tccli/services/mdp/v20200527/api.json +1168 -44
  163. tccli/services/mdp/v20200527/examples.json +151 -79
  164. tccli/services/message/__init__.py +4 -0
  165. tccli/services/message/message_client.py +210 -0
  166. tccli/services/message/v20181225/api.json +72 -0
  167. tccli/services/message/v20181225/examples.json +13 -0
  168. tccli/services/mongodb/mongodb_client.py +1452 -136
  169. tccli/services/mongodb/v20190725/api.json +4393 -1462
  170. tccli/services/mongodb/v20190725/examples.json +265 -71
  171. tccli/services/monitor/monitor_client.py +1008 -296
  172. tccli/services/monitor/v20180724/api.json +660 -11
  173. tccli/services/monitor/v20180724/examples.json +152 -4
  174. tccli/services/mps/mps_client.py +1573 -354
  175. tccli/services/mps/v20190612/api.json +12394 -7243
  176. tccli/services/mps/v20190612/examples.json +244 -84
  177. tccli/services/msp/msp_client.py +35 -14
  178. tccli/services/ocr/ocr_client.py +596 -102
  179. tccli/services/ocr/v20181119/api.json +2271 -181
  180. tccli/services/ocr/v20181119/examples.json +70 -8
  181. tccli/services/omics/omics_client.py +100 -40
  182. tccli/services/organization/organization_client.py +580 -232
  183. tccli/services/postgres/postgres_client.py +455 -182
  184. tccli/services/postgres/v20170312/api.json +134 -109
  185. tccli/services/postgres/v20170312/examples.json +14 -14
  186. tccli/services/privatedns/privatedns_client.py +206 -60
  187. tccli/services/privatedns/v20201028/api.json +179 -0
  188. tccli/services/privatedns/v20201028/examples.json +8 -0
  189. tccli/services/pts/pts_client.py +240 -96
  190. tccli/services/quota/__init__.py +4 -0
  191. tccli/services/quota/quota_client.py +434 -0
  192. tccli/services/quota/v20241204/api.json +548 -0
  193. tccli/services/quota/v20241204/examples.json +51 -0
  194. tccli/services/rce/rce_client.py +5 -2
  195. tccli/services/redis/redis_client.py +698 -212
  196. tccli/services/redis/v20180412/api.json +968 -563
  197. tccli/services/redis/v20180412/examples.json +98 -56
  198. tccli/services/region/__init__.py +4 -0
  199. tccli/services/region/region_client.py +322 -0
  200. tccli/services/region/v20220627/api.json +399 -0
  201. tccli/services/region/v20220627/examples.json +29 -0
  202. tccli/services/rum/rum_client.py +300 -120
  203. tccli/services/scf/scf_client.py +210 -84
  204. tccli/services/ses/ses_client.py +368 -69
  205. tccli/services/ses/v20201002/api.json +240 -0
  206. tccli/services/ses/v20201002/examples.json +32 -0
  207. tccli/services/smh/__init__.py +4 -0
  208. tccli/services/smh/smh_client.py +714 -0
  209. tccli/services/smh/v20210712/api.json +1287 -0
  210. tccli/services/smh/v20210712/examples.json +85 -0
  211. tccli/services/sms/sms_client.py +90 -36
  212. tccli/services/sqlserver/sqlserver_client.py +3855 -470
  213. tccli/services/sqlserver/v20180328/api.json +9757 -3347
  214. tccli/services/sqlserver/v20180328/examples.json +480 -20
  215. tccli/services/ssl/ssl_client.py +504 -72
  216. tccli/services/ssl/v20191205/api.json +789 -21
  217. tccli/services/ssl/v20191205/examples.json +54 -0
  218. tccli/services/ssm/ssm_client.py +120 -48
  219. tccli/services/sts/sts_client.py +25 -10
  220. tccli/services/tag/tag_client.py +150 -60
  221. tccli/services/tat/tat_client.py +95 -38
  222. tccli/services/tbaas/__init__.py +4 -0
  223. tccli/services/tbaas/tbaas_client.py +378 -0
  224. tccli/services/tbaas/v20180416/api.json +551 -0
  225. tccli/services/tbaas/v20180416/examples.json +37 -0
  226. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  227. tccli/services/tcaplusdb/v20190823/api.json +836 -760
  228. tccli/services/tcaplusdb/v20190823/examples.json +3 -3
  229. tccli/services/tchd/tchd_client.py +5 -2
  230. tccli/services/tcmpp/tcmpp_client.py +520 -208
  231. tccli/services/tcr/tcr_client.py +380 -152
  232. tccli/services/tcsas/tcsas_client.py +295 -118
  233. tccli/services/tcsas/v20250106/api.json +155 -79
  234. tccli/services/tcsas/v20250106/examples.json +3 -3
  235. tccli/services/tcss/tcss_client.py +1650 -660
  236. tccli/services/tdid/tdid_client.py +240 -96
  237. tccli/services/tdmq/tdmq_client.py +2876 -466
  238. tccli/services/tdmq/v20200217/api.json +11607 -3958
  239. tccli/services/tdmq/v20200217/examples.json +562 -264
  240. tccli/services/tem/tem_client.py +280 -112
  241. tccli/services/teo/teo_client.py +4507 -966
  242. tccli/services/teo/v20220901/api.json +7341 -1405
  243. tccli/services/teo/v20220901/examples.json +679 -99
  244. tccli/services/tione/__init__.py +4 -0
  245. tccli/services/tione/tione_client.py +210 -0
  246. tccli/services/tione/v20211111/api.json +3074 -0
  247. tccli/services/tione/v20211111/examples.json +12 -0
  248. tccli/services/tiw/tiw_client.py +255 -102
  249. tccli/services/tke/tke_client.py +741 -274
  250. tccli/services/tke/v20180525/api.json +132 -7
  251. tccli/services/tke/v20180525/examples.json +42 -16
  252. tccli/services/tms/tms_client.py +5 -2
  253. tccli/services/tms/v20201229/api.json +91 -100
  254. tccli/services/tmt/tmt_client.py +5 -2
  255. tccli/services/trabbit/__init__.py +4 -0
  256. tccli/services/trabbit/trabbit_client.py +1778 -0
  257. tccli/services/trabbit/v20230418/api.json +4772 -0
  258. tccli/services/trabbit/v20230418/examples.json +237 -0
  259. tccli/services/trocket/__init__.py +4 -0
  260. tccli/services/trocket/trocket_client.py +2450 -0
  261. tccli/services/trocket/v20230308/api.json +6062 -0
  262. tccli/services/trocket/v20230308/examples.json +339 -0
  263. tccli/services/trro/trro_client.py +95 -38
  264. tccli/services/trtc/trtc_client.py +928 -192
  265. tccli/services/trtc/v20190722/api.json +1810 -256
  266. tccli/services/trtc/v20190722/examples.json +100 -6
  267. tccli/services/tts/tts_client.py +5 -2
  268. tccli/services/vclm/vclm_client.py +10 -4
  269. tccli/services/vm/v20210922/api.json +61 -30
  270. tccli/services/vm/v20210922/examples.json +0 -12
  271. tccli/services/vm/vm_client.py +20 -8
  272. tccli/services/vod/v20180717/api.json +332 -52
  273. tccli/services/vod/v20180717/examples.json +9 -1
  274. tccli/services/vod/v20240718/api.json +1105 -0
  275. tccli/services/vod/v20240718/examples.json +97 -0
  276. tccli/services/vod/vod_client.py +1316 -350
  277. tccli/services/vpc/v20170312/api.json +1166 -106
  278. tccli/services/vpc/v20170312/examples.json +197 -23
  279. tccli/services/vpc/vpc_client.py +2413 -739
  280. tccli/services/waf/v20180125/api.json +1372 -194
  281. tccli/services/waf/v20180125/examples.json +89 -1
  282. tccli/services/waf/waf_client.py +1149 -245
  283. tccli/services/wedata/v20210820/api.json +1577 -231
  284. tccli/services/wedata/v20210820/examples.json +74 -12
  285. tccli/services/wedata/v20250806/api.json +13644 -0
  286. tccli/services/wedata/v20250806/examples.json +621 -0
  287. tccli/services/wedata/wedata_client.py +6366 -1191
  288. tccli/services/yunjing/yunjing_client.py +355 -142
  289. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
  290. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +294 -230
  291. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
  292. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
  293. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
  294. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,10 @@ def doDescribeRoute(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doDescribeRoute(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doDescribeGroupInfo(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doDescribeGroupInfo(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doCreateConsumer(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doCreateConsumer(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doCreateAcl(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doCreateAcl(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -225,7 +237,7 @@ def doCreateAcl(args, parsed_globals):
225
237
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
238
 
227
239
 
228
- def doCreateInstancePost(args, parsed_globals):
240
+ def doDescribeTypeInstances(args, parsed_globals):
229
241
  g_param = parse_global_arg(parsed_globals)
230
242
 
231
243
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -235,7 +247,10 @@ def doCreateInstancePost(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,18 +262,73 @@ def doCreateInstancePost(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
254
269
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
255
270
  client._sdkVersion += ("_CLI_" + __version__)
256
271
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.CreateInstancePostRequest()
272
+ model = models.DescribeTypeInstancesRequest()
258
273
  model.from_json_string(json.dumps(args))
259
274
  start_time = time.time()
260
275
  while True:
261
- rsp = client.CreateInstancePost(model)
276
+ rsp = client.DescribeTypeInstances(model)
277
+ result = rsp.to_json_string()
278
+ try:
279
+ json_obj = json.loads(result)
280
+ except TypeError as e:
281
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
282
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
283
+ break
284
+ cur_time = time.time()
285
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
286
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
287
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
288
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
289
+ else:
290
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
291
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
292
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
293
+
294
+
295
+ def doDescribeDatahubTopics(args, parsed_globals):
296
+ g_param = parse_global_arg(parsed_globals)
297
+
298
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
299
+ cred = credential.CVMRoleCredential()
300
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
301
+ cred = credential.STSAssumeRoleCredential(
302
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
303
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
304
+ )
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
309
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
310
+ else:
311
+ cred = credential.Credential(
312
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
313
+ )
314
+ http_profile = HttpProfile(
315
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
316
+ reqMethod="POST",
317
+ endpoint=g_param[OptionsDefine.Endpoint],
318
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
319
+ )
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
321
+ if g_param[OptionsDefine.Language]:
322
+ profile.language = g_param[OptionsDefine.Language]
323
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
324
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
325
+ client._sdkVersion += ("_CLI_" + __version__)
326
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
327
+ model = models.DescribeDatahubTopicsRequest()
328
+ model.from_json_string(json.dumps(args))
329
+ start_time = time.time()
330
+ while True:
331
+ rsp = client.DescribeDatahubTopics(model)
262
332
  result = rsp.to_json_string()
263
333
  try:
264
334
  json_obj = json.loads(result)
@@ -287,7 +357,560 @@ def doDescribeAclRule(args, parsed_globals):
287
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
359
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
364
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
365
+ else:
366
+ cred = credential.Credential(
367
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
368
+ )
369
+ http_profile = HttpProfile(
370
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
371
+ reqMethod="POST",
372
+ endpoint=g_param[OptionsDefine.Endpoint],
373
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
374
+ )
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
376
+ if g_param[OptionsDefine.Language]:
377
+ profile.language = g_param[OptionsDefine.Language]
378
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
379
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
380
+ client._sdkVersion += ("_CLI_" + __version__)
381
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
382
+ model = models.DescribeAclRuleRequest()
383
+ model.from_json_string(json.dumps(args))
384
+ start_time = time.time()
385
+ while True:
386
+ rsp = client.DescribeAclRule(model)
387
+ result = rsp.to_json_string()
388
+ try:
389
+ json_obj = json.loads(result)
390
+ except TypeError as e:
391
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
392
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
393
+ break
394
+ cur_time = time.time()
395
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
396
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
397
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
398
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
399
+ else:
400
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
401
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
402
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
403
+
404
+
405
+ def doCreateTopic(args, parsed_globals):
406
+ g_param = parse_global_arg(parsed_globals)
407
+
408
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
409
+ cred = credential.CVMRoleCredential()
410
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
411
+ cred = credential.STSAssumeRoleCredential(
412
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
413
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
414
+ )
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
419
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
420
+ else:
421
+ cred = credential.Credential(
422
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
423
+ )
424
+ http_profile = HttpProfile(
425
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
426
+ reqMethod="POST",
427
+ endpoint=g_param[OptionsDefine.Endpoint],
428
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
429
+ )
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
431
+ if g_param[OptionsDefine.Language]:
432
+ profile.language = g_param[OptionsDefine.Language]
433
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
434
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
435
+ client._sdkVersion += ("_CLI_" + __version__)
436
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
437
+ model = models.CreateTopicRequest()
438
+ model.from_json_string(json.dumps(args))
439
+ start_time = time.time()
440
+ while True:
441
+ rsp = client.CreateTopic(model)
442
+ result = rsp.to_json_string()
443
+ try:
444
+ json_obj = json.loads(result)
445
+ except TypeError as e:
446
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
447
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
448
+ break
449
+ cur_time = time.time()
450
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
451
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
452
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
453
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
454
+ else:
455
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
456
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
457
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
458
+
459
+
460
+ def doDescribeSecurityGroupRoutes(args, parsed_globals):
461
+ g_param = parse_global_arg(parsed_globals)
462
+
463
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
464
+ cred = credential.CVMRoleCredential()
465
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
466
+ cred = credential.STSAssumeRoleCredential(
467
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
468
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
469
+ )
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
474
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
475
+ else:
476
+ cred = credential.Credential(
477
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
478
+ )
479
+ http_profile = HttpProfile(
480
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
481
+ reqMethod="POST",
482
+ endpoint=g_param[OptionsDefine.Endpoint],
483
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
484
+ )
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
486
+ if g_param[OptionsDefine.Language]:
487
+ profile.language = g_param[OptionsDefine.Language]
488
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
489
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
490
+ client._sdkVersion += ("_CLI_" + __version__)
491
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
492
+ model = models.DescribeSecurityGroupRoutesRequest()
493
+ model.from_json_string(json.dumps(args))
494
+ start_time = time.time()
495
+ while True:
496
+ rsp = client.DescribeSecurityGroupRoutes(model)
497
+ result = rsp.to_json_string()
498
+ try:
499
+ json_obj = json.loads(result)
500
+ except TypeError as e:
501
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
502
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
503
+ break
504
+ cur_time = time.time()
505
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
506
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
507
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
508
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
509
+ else:
510
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
511
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
512
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
513
+
514
+
515
+ def doBatchModifyTopicAttributes(args, parsed_globals):
516
+ g_param = parse_global_arg(parsed_globals)
517
+
518
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
519
+ cred = credential.CVMRoleCredential()
520
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
521
+ cred = credential.STSAssumeRoleCredential(
522
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
523
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
524
+ )
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
529
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
530
+ else:
531
+ cred = credential.Credential(
532
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
533
+ )
534
+ http_profile = HttpProfile(
535
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
536
+ reqMethod="POST",
537
+ endpoint=g_param[OptionsDefine.Endpoint],
538
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
539
+ )
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
541
+ if g_param[OptionsDefine.Language]:
542
+ profile.language = g_param[OptionsDefine.Language]
543
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
544
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
545
+ client._sdkVersion += ("_CLI_" + __version__)
546
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
547
+ model = models.BatchModifyTopicAttributesRequest()
548
+ model.from_json_string(json.dumps(args))
549
+ start_time = time.time()
550
+ while True:
551
+ rsp = client.BatchModifyTopicAttributes(model)
552
+ result = rsp.to_json_string()
553
+ try:
554
+ json_obj = json.loads(result)
555
+ except TypeError as e:
556
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
557
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
558
+ break
559
+ cur_time = time.time()
560
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
561
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
562
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
563
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
564
+ else:
565
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
566
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
567
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
568
+
569
+
570
+ def doDeleteRoute(args, parsed_globals):
571
+ g_param = parse_global_arg(parsed_globals)
572
+
573
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
574
+ cred = credential.CVMRoleCredential()
575
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
576
+ cred = credential.STSAssumeRoleCredential(
577
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
578
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
579
+ )
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
584
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
585
+ else:
586
+ cred = credential.Credential(
587
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
588
+ )
589
+ http_profile = HttpProfile(
590
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
591
+ reqMethod="POST",
592
+ endpoint=g_param[OptionsDefine.Endpoint],
593
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
594
+ )
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
596
+ if g_param[OptionsDefine.Language]:
597
+ profile.language = g_param[OptionsDefine.Language]
598
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
599
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
600
+ client._sdkVersion += ("_CLI_" + __version__)
601
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
602
+ model = models.DeleteRouteRequest()
603
+ model.from_json_string(json.dumps(args))
604
+ start_time = time.time()
605
+ while True:
606
+ rsp = client.DeleteRoute(model)
607
+ result = rsp.to_json_string()
608
+ try:
609
+ json_obj = json.loads(result)
610
+ except TypeError as e:
611
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
612
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
613
+ break
614
+ cur_time = time.time()
615
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
616
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
617
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
618
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
619
+ else:
620
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
621
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
622
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
623
+
624
+
625
+ def doSendMessage(args, parsed_globals):
626
+ g_param = parse_global_arg(parsed_globals)
627
+
628
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
629
+ cred = credential.CVMRoleCredential()
630
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
631
+ cred = credential.STSAssumeRoleCredential(
632
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
633
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
634
+ )
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
639
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
640
+ else:
641
+ cred = credential.Credential(
642
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
643
+ )
644
+ http_profile = HttpProfile(
645
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
646
+ reqMethod="POST",
647
+ endpoint=g_param[OptionsDefine.Endpoint],
648
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
649
+ )
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
651
+ if g_param[OptionsDefine.Language]:
652
+ profile.language = g_param[OptionsDefine.Language]
653
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
654
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
655
+ client._sdkVersion += ("_CLI_" + __version__)
656
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
657
+ model = models.SendMessageRequest()
658
+ model.from_json_string(json.dumps(args))
659
+ start_time = time.time()
660
+ while True:
661
+ rsp = client.SendMessage(model)
662
+ result = rsp.to_json_string()
663
+ try:
664
+ json_obj = json.loads(result)
665
+ except TypeError as e:
666
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
667
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
668
+ break
669
+ cur_time = time.time()
670
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
671
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
672
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
673
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
674
+ else:
675
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
676
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
677
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
678
+
679
+
680
+ def doDescribeUser(args, parsed_globals):
681
+ g_param = parse_global_arg(parsed_globals)
682
+
683
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
684
+ cred = credential.CVMRoleCredential()
685
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
686
+ cred = credential.STSAssumeRoleCredential(
687
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
688
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
689
+ )
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
694
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
695
+ else:
696
+ cred = credential.Credential(
697
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
698
+ )
699
+ http_profile = HttpProfile(
700
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
701
+ reqMethod="POST",
702
+ endpoint=g_param[OptionsDefine.Endpoint],
703
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
704
+ )
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
706
+ if g_param[OptionsDefine.Language]:
707
+ profile.language = g_param[OptionsDefine.Language]
708
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
709
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
710
+ client._sdkVersion += ("_CLI_" + __version__)
711
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
712
+ model = models.DescribeUserRequest()
713
+ model.from_json_string(json.dumps(args))
714
+ start_time = time.time()
715
+ while True:
716
+ rsp = client.DescribeUser(model)
717
+ result = rsp.to_json_string()
718
+ try:
719
+ json_obj = json.loads(result)
720
+ except TypeError as e:
721
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
722
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
723
+ break
724
+ cur_time = time.time()
725
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
726
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
727
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
728
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
729
+ else:
730
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
731
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
732
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
733
+
734
+
735
+ def doDescribeGroup(args, parsed_globals):
736
+ g_param = parse_global_arg(parsed_globals)
737
+
738
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
739
+ cred = credential.CVMRoleCredential()
740
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
741
+ cred = credential.STSAssumeRoleCredential(
742
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
743
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
744
+ )
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
749
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
750
+ else:
751
+ cred = credential.Credential(
752
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
753
+ )
754
+ http_profile = HttpProfile(
755
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
756
+ reqMethod="POST",
757
+ endpoint=g_param[OptionsDefine.Endpoint],
758
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
759
+ )
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
761
+ if g_param[OptionsDefine.Language]:
762
+ profile.language = g_param[OptionsDefine.Language]
763
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
764
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
765
+ client._sdkVersion += ("_CLI_" + __version__)
766
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
767
+ model = models.DescribeGroupRequest()
768
+ model.from_json_string(json.dumps(args))
769
+ start_time = time.time()
770
+ while True:
771
+ rsp = client.DescribeGroup(model)
772
+ result = rsp.to_json_string()
773
+ try:
774
+ json_obj = json.loads(result)
775
+ except TypeError as e:
776
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
777
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
778
+ break
779
+ cur_time = time.time()
780
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
781
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
782
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
783
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
784
+ else:
785
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
786
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
787
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
788
+
789
+
790
+ def doCreateTopicIpWhiteList(args, parsed_globals):
791
+ g_param = parse_global_arg(parsed_globals)
792
+
793
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
794
+ cred = credential.CVMRoleCredential()
795
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
796
+ cred = credential.STSAssumeRoleCredential(
797
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
798
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
799
+ )
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
804
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
805
+ else:
806
+ cred = credential.Credential(
807
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
808
+ )
809
+ http_profile = HttpProfile(
810
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
811
+ reqMethod="POST",
812
+ endpoint=g_param[OptionsDefine.Endpoint],
813
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
814
+ )
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
816
+ if g_param[OptionsDefine.Language]:
817
+ profile.language = g_param[OptionsDefine.Language]
818
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
819
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
820
+ client._sdkVersion += ("_CLI_" + __version__)
821
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
822
+ model = models.CreateTopicIpWhiteListRequest()
823
+ model.from_json_string(json.dumps(args))
824
+ start_time = time.time()
825
+ while True:
826
+ rsp = client.CreateTopicIpWhiteList(model)
827
+ result = rsp.to_json_string()
828
+ try:
829
+ json_obj = json.loads(result)
830
+ except TypeError as e:
831
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
832
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
833
+ break
834
+ cur_time = time.time()
835
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
836
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
837
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
838
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
839
+ else:
840
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
841
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
842
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
843
+
844
+
845
+ def doDescribeCkafkaVersion(args, parsed_globals):
846
+ g_param = parse_global_arg(parsed_globals)
847
+
848
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
849
+ cred = credential.CVMRoleCredential()
850
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
851
+ cred = credential.STSAssumeRoleCredential(
852
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
853
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
854
+ )
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
859
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
860
+ else:
861
+ cred = credential.Credential(
862
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
863
+ )
864
+ http_profile = HttpProfile(
865
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
866
+ reqMethod="POST",
867
+ endpoint=g_param[OptionsDefine.Endpoint],
868
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
869
+ )
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
871
+ if g_param[OptionsDefine.Language]:
872
+ profile.language = g_param[OptionsDefine.Language]
873
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
874
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
875
+ client._sdkVersion += ("_CLI_" + __version__)
876
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
877
+ model = models.DescribeCkafkaVersionRequest()
878
+ model.from_json_string(json.dumps(args))
879
+ start_time = time.time()
880
+ while True:
881
+ rsp = client.DescribeCkafkaVersion(model)
882
+ result = rsp.to_json_string()
883
+ try:
884
+ json_obj = json.loads(result)
885
+ except TypeError as e:
886
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
887
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
888
+ break
889
+ cur_time = time.time()
890
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
891
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
892
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
893
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
894
+ else:
895
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
896
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
897
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
898
+
899
+
900
+ def doModifyGroupOffsets(args, parsed_globals):
901
+ g_param = parse_global_arg(parsed_globals)
902
+
903
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
904
+ cred = credential.CVMRoleCredential()
905
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
906
+ cred = credential.STSAssumeRoleCredential(
907
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
908
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
909
+ )
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
915
  else:
293
916
  cred = credential.Credential(
@@ -299,18 +922,18 @@ def doDescribeAclRule(args, parsed_globals):
299
922
  endpoint=g_param[OptionsDefine.Endpoint],
300
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
924
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
926
  if g_param[OptionsDefine.Language]:
304
927
  profile.language = g_param[OptionsDefine.Language]
305
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
306
929
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
307
930
  client._sdkVersion += ("_CLI_" + __version__)
308
931
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
309
- model = models.DescribeAclRuleRequest()
932
+ model = models.ModifyGroupOffsetsRequest()
310
933
  model.from_json_string(json.dumps(args))
311
934
  start_time = time.time()
312
935
  while True:
313
- rsp = client.DescribeAclRule(model)
936
+ rsp = client.ModifyGroupOffsets(model)
314
937
  result = rsp.to_json_string()
315
938
  try:
316
939
  json_obj = json.loads(result)
@@ -329,7 +952,7 @@ def doDescribeAclRule(args, parsed_globals):
329
952
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
953
 
331
954
 
332
- def doCreateTopic(args, parsed_globals):
955
+ def doUpgradeBrokerVersion(args, parsed_globals):
333
956
  g_param = parse_global_arg(parsed_globals)
334
957
 
335
958
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -339,7 +962,10 @@ def doCreateTopic(args, parsed_globals):
339
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
964
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
970
  else:
345
971
  cred = credential.Credential(
@@ -351,18 +977,18 @@ def doCreateTopic(args, parsed_globals):
351
977
  endpoint=g_param[OptionsDefine.Endpoint],
352
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
979
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
981
  if g_param[OptionsDefine.Language]:
356
982
  profile.language = g_param[OptionsDefine.Language]
357
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
358
984
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
359
985
  client._sdkVersion += ("_CLI_" + __version__)
360
986
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
- model = models.CreateTopicRequest()
987
+ model = models.UpgradeBrokerVersionRequest()
362
988
  model.from_json_string(json.dumps(args))
363
989
  start_time = time.time()
364
990
  while True:
365
- rsp = client.CreateTopic(model)
991
+ rsp = client.UpgradeBrokerVersion(model)
366
992
  result = rsp.to_json_string()
367
993
  try:
368
994
  json_obj = json.loads(result)
@@ -381,7 +1007,7 @@ def doCreateTopic(args, parsed_globals):
381
1007
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
1008
 
383
1009
 
384
- def doModifyInstancePre(args, parsed_globals):
1010
+ def doDescribeInstances(args, parsed_globals):
385
1011
  g_param = parse_global_arg(parsed_globals)
386
1012
 
387
1013
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -391,7 +1017,10 @@ def doModifyInstancePre(args, parsed_globals):
391
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
1019
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
1025
  else:
397
1026
  cred = credential.Credential(
@@ -403,18 +1032,18 @@ def doModifyInstancePre(args, parsed_globals):
403
1032
  endpoint=g_param[OptionsDefine.Endpoint],
404
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
1034
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
1036
  if g_param[OptionsDefine.Language]:
408
1037
  profile.language = g_param[OptionsDefine.Language]
409
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
1039
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
411
1040
  client._sdkVersion += ("_CLI_" + __version__)
412
1041
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.ModifyInstancePreRequest()
1042
+ model = models.DescribeInstancesRequest()
414
1043
  model.from_json_string(json.dumps(args))
415
1044
  start_time = time.time()
416
1045
  while True:
417
- rsp = client.ModifyInstancePre(model)
1046
+ rsp = client.DescribeInstances(model)
418
1047
  result = rsp.to_json_string()
419
1048
  try:
420
1049
  json_obj = json.loads(result)
@@ -433,7 +1062,7 @@ def doModifyInstancePre(args, parsed_globals):
433
1062
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
1063
 
435
1064
 
436
- def doBatchModifyTopicAttributes(args, parsed_globals):
1065
+ def doDescribeCvmInfo(args, parsed_globals):
437
1066
  g_param = parse_global_arg(parsed_globals)
438
1067
 
439
1068
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -443,7 +1072,10 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
443
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
1074
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
1080
  else:
449
1081
  cred = credential.Credential(
@@ -455,18 +1087,18 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
455
1087
  endpoint=g_param[OptionsDefine.Endpoint],
456
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
1089
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
1091
  if g_param[OptionsDefine.Language]:
460
1092
  profile.language = g_param[OptionsDefine.Language]
461
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
462
1094
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
463
1095
  client._sdkVersion += ("_CLI_" + __version__)
464
1096
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
- model = models.BatchModifyTopicAttributesRequest()
1097
+ model = models.DescribeCvmInfoRequest()
466
1098
  model.from_json_string(json.dumps(args))
467
1099
  start_time = time.time()
468
1100
  while True:
469
- rsp = client.BatchModifyTopicAttributes(model)
1101
+ rsp = client.DescribeCvmInfo(model)
470
1102
  result = rsp.to_json_string()
471
1103
  try:
472
1104
  json_obj = json.loads(result)
@@ -485,7 +1117,7 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
485
1117
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
1118
 
487
1119
 
488
- def doDeleteRoute(args, parsed_globals):
1120
+ def doDescribeDatahubTopic(args, parsed_globals):
489
1121
  g_param = parse_global_arg(parsed_globals)
490
1122
 
491
1123
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -495,7 +1127,10 @@ def doDeleteRoute(args, parsed_globals):
495
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
1129
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
1135
  else:
501
1136
  cred = credential.Credential(
@@ -507,18 +1142,18 @@ def doDeleteRoute(args, parsed_globals):
507
1142
  endpoint=g_param[OptionsDefine.Endpoint],
508
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
1144
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
1146
  if g_param[OptionsDefine.Language]:
512
1147
  profile.language = g_param[OptionsDefine.Language]
513
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
514
1149
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
515
1150
  client._sdkVersion += ("_CLI_" + __version__)
516
1151
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.DeleteRouteRequest()
1152
+ model = models.DescribeDatahubTopicRequest()
518
1153
  model.from_json_string(json.dumps(args))
519
1154
  start_time = time.time()
520
1155
  while True:
521
- rsp = client.DeleteRoute(model)
1156
+ rsp = client.DescribeDatahubTopic(model)
522
1157
  result = rsp.to_json_string()
523
1158
  try:
524
1159
  json_obj = json.loads(result)
@@ -537,7 +1172,7 @@ def doDeleteRoute(args, parsed_globals):
537
1172
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
1173
 
539
1174
 
540
- def doSendMessage(args, parsed_globals):
1175
+ def doCreateRoute(args, parsed_globals):
541
1176
  g_param = parse_global_arg(parsed_globals)
542
1177
 
543
1178
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -547,7 +1182,10 @@ def doSendMessage(args, parsed_globals):
547
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
1184
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
1190
  else:
553
1191
  cred = credential.Credential(
@@ -559,18 +1197,18 @@ def doSendMessage(args, parsed_globals):
559
1197
  endpoint=g_param[OptionsDefine.Endpoint],
560
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
1199
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
1201
  if g_param[OptionsDefine.Language]:
564
1202
  profile.language = g_param[OptionsDefine.Language]
565
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
566
1204
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
567
1205
  client._sdkVersion += ("_CLI_" + __version__)
568
1206
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.SendMessageRequest()
1207
+ model = models.CreateRouteRequest()
570
1208
  model.from_json_string(json.dumps(args))
571
1209
  start_time = time.time()
572
1210
  while True:
573
- rsp = client.SendMessage(model)
1211
+ rsp = client.CreateRoute(model)
574
1212
  result = rsp.to_json_string()
575
1213
  try:
576
1214
  json_obj = json.loads(result)
@@ -589,7 +1227,7 @@ def doSendMessage(args, parsed_globals):
589
1227
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
1228
 
591
1229
 
592
- def doDescribeUser(args, parsed_globals):
1230
+ def doDeleteGroup(args, parsed_globals):
593
1231
  g_param = parse_global_arg(parsed_globals)
594
1232
 
595
1233
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -599,7 +1237,10 @@ def doDescribeUser(args, parsed_globals):
599
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
1239
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
1245
  else:
605
1246
  cred = credential.Credential(
@@ -611,18 +1252,18 @@ def doDescribeUser(args, parsed_globals):
611
1252
  endpoint=g_param[OptionsDefine.Endpoint],
612
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
1254
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
1256
  if g_param[OptionsDefine.Language]:
616
1257
  profile.language = g_param[OptionsDefine.Language]
617
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
618
1259
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
619
1260
  client._sdkVersion += ("_CLI_" + __version__)
620
1261
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.DescribeUserRequest()
1262
+ model = models.DeleteGroupRequest()
622
1263
  model.from_json_string(json.dumps(args))
623
1264
  start_time = time.time()
624
1265
  while True:
625
- rsp = client.DescribeUser(model)
1266
+ rsp = client.DeleteGroup(model)
626
1267
  result = rsp.to_json_string()
627
1268
  try:
628
1269
  json_obj = json.loads(result)
@@ -641,7 +1282,7 @@ def doDescribeUser(args, parsed_globals):
641
1282
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
1283
 
643
1284
 
644
- def doCreateTopicIpWhiteList(args, parsed_globals):
1285
+ def doModifyDatahubTopic(args, parsed_globals):
645
1286
  g_param = parse_global_arg(parsed_globals)
646
1287
 
647
1288
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -651,7 +1292,10 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
651
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
1294
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
1300
  else:
657
1301
  cred = credential.Credential(
@@ -663,18 +1307,18 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
663
1307
  endpoint=g_param[OptionsDefine.Endpoint],
664
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
1309
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
1311
  if g_param[OptionsDefine.Language]:
668
1312
  profile.language = g_param[OptionsDefine.Language]
669
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
670
1314
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
671
1315
  client._sdkVersion += ("_CLI_" + __version__)
672
1316
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
- model = models.CreateTopicIpWhiteListRequest()
1317
+ model = models.ModifyDatahubTopicRequest()
674
1318
  model.from_json_string(json.dumps(args))
675
1319
  start_time = time.time()
676
1320
  while True:
677
- rsp = client.CreateTopicIpWhiteList(model)
1321
+ rsp = client.ModifyDatahubTopic(model)
678
1322
  result = rsp.to_json_string()
679
1323
  try:
680
1324
  json_obj = json.loads(result)
@@ -693,7 +1337,7 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
693
1337
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
1338
 
695
1339
 
696
- def doDescribeGroup(args, parsed_globals):
1340
+ def doFetchMessageListByOffset(args, parsed_globals):
697
1341
  g_param = parse_global_arg(parsed_globals)
698
1342
 
699
1343
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -703,7 +1347,10 @@ def doDescribeGroup(args, parsed_globals):
703
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
1349
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
1355
  else:
709
1356
  cred = credential.Credential(
@@ -715,18 +1362,18 @@ def doDescribeGroup(args, parsed_globals):
715
1362
  endpoint=g_param[OptionsDefine.Endpoint],
716
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
1364
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
1366
  if g_param[OptionsDefine.Language]:
720
1367
  profile.language = g_param[OptionsDefine.Language]
721
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
722
1369
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
723
1370
  client._sdkVersion += ("_CLI_" + __version__)
724
1371
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.DescribeGroupRequest()
1372
+ model = models.FetchMessageListByOffsetRequest()
726
1373
  model.from_json_string(json.dumps(args))
727
1374
  start_time = time.time()
728
1375
  while True:
729
- rsp = client.DescribeGroup(model)
1376
+ rsp = client.FetchMessageListByOffset(model)
730
1377
  result = rsp.to_json_string()
731
1378
  try:
732
1379
  json_obj = json.loads(result)
@@ -745,7 +1392,7 @@ def doDescribeGroup(args, parsed_globals):
745
1392
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
1393
 
747
1394
 
748
- def doModifyGroupOffsets(args, parsed_globals):
1395
+ def doCreateDatahubTopic(args, parsed_globals):
749
1396
  g_param = parse_global_arg(parsed_globals)
750
1397
 
751
1398
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -755,7 +1402,10 @@ def doModifyGroupOffsets(args, parsed_globals):
755
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
1404
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
1410
  else:
761
1411
  cred = credential.Credential(
@@ -767,18 +1417,18 @@ def doModifyGroupOffsets(args, parsed_globals):
767
1417
  endpoint=g_param[OptionsDefine.Endpoint],
768
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
1419
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
1421
  if g_param[OptionsDefine.Language]:
772
1422
  profile.language = g_param[OptionsDefine.Language]
773
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
774
1424
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
775
1425
  client._sdkVersion += ("_CLI_" + __version__)
776
1426
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.ModifyGroupOffsetsRequest()
1427
+ model = models.CreateDatahubTopicRequest()
778
1428
  model.from_json_string(json.dumps(args))
779
1429
  start_time = time.time()
780
1430
  while True:
781
- rsp = client.ModifyGroupOffsets(model)
1431
+ rsp = client.CreateDatahubTopic(model)
782
1432
  result = rsp.to_json_string()
783
1433
  try:
784
1434
  json_obj = json.loads(result)
@@ -797,7 +1447,7 @@ def doModifyGroupOffsets(args, parsed_globals):
797
1447
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
1448
 
799
1449
 
800
- def doDescribeInstances(args, parsed_globals):
1450
+ def doDeleteInstancePost(args, parsed_globals):
801
1451
  g_param = parse_global_arg(parsed_globals)
802
1452
 
803
1453
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -807,7 +1457,10 @@ def doDescribeInstances(args, parsed_globals):
807
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
1459
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
1465
  else:
813
1466
  cred = credential.Credential(
@@ -819,18 +1472,18 @@ def doDescribeInstances(args, parsed_globals):
819
1472
  endpoint=g_param[OptionsDefine.Endpoint],
820
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
1474
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
1476
  if g_param[OptionsDefine.Language]:
824
1477
  profile.language = g_param[OptionsDefine.Language]
825
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
826
1479
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
827
1480
  client._sdkVersion += ("_CLI_" + __version__)
828
1481
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
829
- model = models.DescribeInstancesRequest()
1482
+ model = models.DeleteInstancePostRequest()
830
1483
  model.from_json_string(json.dumps(args))
831
1484
  start_time = time.time()
832
1485
  while True:
833
- rsp = client.DescribeInstances(model)
1486
+ rsp = client.DeleteInstancePost(model)
834
1487
  result = rsp.to_json_string()
835
1488
  try:
836
1489
  json_obj = json.loads(result)
@@ -849,7 +1502,7 @@ def doDescribeInstances(args, parsed_globals):
849
1502
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
1503
 
851
1504
 
852
- def doModifyInstanceAttributes(args, parsed_globals):
1505
+ def doDescribeACL(args, parsed_globals):
853
1506
  g_param = parse_global_arg(parsed_globals)
854
1507
 
855
1508
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -859,7 +1512,10 @@ def doModifyInstanceAttributes(args, parsed_globals):
859
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
1514
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
1520
  else:
865
1521
  cred = credential.Credential(
@@ -871,18 +1527,18 @@ def doModifyInstanceAttributes(args, parsed_globals):
871
1527
  endpoint=g_param[OptionsDefine.Endpoint],
872
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
1529
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
1531
  if g_param[OptionsDefine.Language]:
876
1532
  profile.language = g_param[OptionsDefine.Language]
877
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
878
1534
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
879
1535
  client._sdkVersion += ("_CLI_" + __version__)
880
1536
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
881
- model = models.ModifyInstanceAttributesRequest()
1537
+ model = models.DescribeACLRequest()
882
1538
  model.from_json_string(json.dumps(args))
883
1539
  start_time = time.time()
884
1540
  while True:
885
- rsp = client.ModifyInstanceAttributes(model)
1541
+ rsp = client.DescribeACL(model)
886
1542
  result = rsp.to_json_string()
887
1543
  try:
888
1544
  json_obj = json.loads(result)
@@ -901,7 +1557,7 @@ def doModifyInstanceAttributes(args, parsed_globals):
901
1557
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
902
1558
 
903
1559
 
904
- def doModifyDatahubTopic(args, parsed_globals):
1560
+ def doDescribeTopicDetail(args, parsed_globals):
905
1561
  g_param = parse_global_arg(parsed_globals)
906
1562
 
907
1563
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -911,7 +1567,10 @@ def doModifyDatahubTopic(args, parsed_globals):
911
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1569
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1575
  else:
917
1576
  cred = credential.Credential(
@@ -923,18 +1582,18 @@ def doModifyDatahubTopic(args, parsed_globals):
923
1582
  endpoint=g_param[OptionsDefine.Endpoint],
924
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
1584
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
1586
  if g_param[OptionsDefine.Language]:
928
1587
  profile.language = g_param[OptionsDefine.Language]
929
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
930
1589
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
931
1590
  client._sdkVersion += ("_CLI_" + __version__)
932
1591
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
933
- model = models.ModifyDatahubTopicRequest()
1592
+ model = models.DescribeTopicDetailRequest()
934
1593
  model.from_json_string(json.dumps(args))
935
1594
  start_time = time.time()
936
1595
  while True:
937
- rsp = client.ModifyDatahubTopic(model)
1596
+ rsp = client.DescribeTopicDetail(model)
938
1597
  result = rsp.to_json_string()
939
1598
  try:
940
1599
  json_obj = json.loads(result)
@@ -953,7 +1612,7 @@ def doModifyDatahubTopic(args, parsed_globals):
953
1612
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
1613
 
955
1614
 
956
- def doFetchMessageListByOffset(args, parsed_globals):
1615
+ def doCreateInstancePre(args, parsed_globals):
957
1616
  g_param = parse_global_arg(parsed_globals)
958
1617
 
959
1618
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -963,7 +1622,10 @@ def doFetchMessageListByOffset(args, parsed_globals):
963
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1624
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1630
  else:
969
1631
  cred = credential.Credential(
@@ -975,18 +1637,18 @@ def doFetchMessageListByOffset(args, parsed_globals):
975
1637
  endpoint=g_param[OptionsDefine.Endpoint],
976
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1639
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1641
  if g_param[OptionsDefine.Language]:
980
1642
  profile.language = g_param[OptionsDefine.Language]
981
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
982
1644
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
983
1645
  client._sdkVersion += ("_CLI_" + __version__)
984
1646
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
985
- model = models.FetchMessageListByOffsetRequest()
1647
+ model = models.CreateInstancePreRequest()
986
1648
  model.from_json_string(json.dumps(args))
987
1649
  start_time = time.time()
988
1650
  while True:
989
- rsp = client.FetchMessageListByOffset(model)
1651
+ rsp = client.CreateInstancePre(model)
990
1652
  result = rsp.to_json_string()
991
1653
  try:
992
1654
  json_obj = json.loads(result)
@@ -1005,7 +1667,7 @@ def doFetchMessageListByOffset(args, parsed_globals):
1005
1667
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1668
 
1007
1669
 
1008
- def doCreateDatahubTopic(args, parsed_globals):
1670
+ def doFetchMessageByOffset(args, parsed_globals):
1009
1671
  g_param = parse_global_arg(parsed_globals)
1010
1672
 
1011
1673
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1015,7 +1677,10 @@ def doCreateDatahubTopic(args, parsed_globals):
1015
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1679
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1685
  else:
1021
1686
  cred = credential.Credential(
@@ -1027,18 +1692,18 @@ def doCreateDatahubTopic(args, parsed_globals):
1027
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1694
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1696
  if g_param[OptionsDefine.Language]:
1032
1697
  profile.language = g_param[OptionsDefine.Language]
1033
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1034
1699
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1035
1700
  client._sdkVersion += ("_CLI_" + __version__)
1036
1701
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1037
- model = models.CreateDatahubTopicRequest()
1702
+ model = models.FetchMessageByOffsetRequest()
1038
1703
  model.from_json_string(json.dumps(args))
1039
1704
  start_time = time.time()
1040
1705
  while True:
1041
- rsp = client.CreateDatahubTopic(model)
1706
+ rsp = client.FetchMessageByOffset(model)
1042
1707
  result = rsp.to_json_string()
1043
1708
  try:
1044
1709
  json_obj = json.loads(result)
@@ -1057,7 +1722,7 @@ def doCreateDatahubTopic(args, parsed_globals):
1057
1722
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
1723
 
1059
1724
 
1060
- def doDescribeACL(args, parsed_globals):
1725
+ def doDeleteTopicIpWhiteList(args, parsed_globals):
1061
1726
  g_param = parse_global_arg(parsed_globals)
1062
1727
 
1063
1728
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1067,7 +1732,10 @@ def doDescribeACL(args, parsed_globals):
1067
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1734
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1740
  else:
1073
1741
  cred = credential.Credential(
@@ -1079,18 +1747,18 @@ def doDescribeACL(args, parsed_globals):
1079
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1749
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1751
  if g_param[OptionsDefine.Language]:
1084
1752
  profile.language = g_param[OptionsDefine.Language]
1085
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
1754
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1087
1755
  client._sdkVersion += ("_CLI_" + __version__)
1088
1756
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
- model = models.DescribeACLRequest()
1757
+ model = models.DeleteTopicIpWhiteListRequest()
1090
1758
  model.from_json_string(json.dumps(args))
1091
1759
  start_time = time.time()
1092
1760
  while True:
1093
- rsp = client.DescribeACL(model)
1761
+ rsp = client.DeleteTopicIpWhiteList(model)
1094
1762
  result = rsp.to_json_string()
1095
1763
  try:
1096
1764
  json_obj = json.loads(result)
@@ -1109,7 +1777,7 @@ def doDescribeACL(args, parsed_globals):
1109
1777
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
1778
 
1111
1779
 
1112
- def doDescribeDatahubTopics(args, parsed_globals):
1780
+ def doModifyPassword(args, parsed_globals):
1113
1781
  g_param = parse_global_arg(parsed_globals)
1114
1782
 
1115
1783
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1119,7 +1787,10 @@ def doDescribeDatahubTopics(args, parsed_globals):
1119
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1789
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1795
  else:
1125
1796
  cred = credential.Credential(
@@ -1131,18 +1802,18 @@ def doDescribeDatahubTopics(args, parsed_globals):
1131
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1804
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1806
  if g_param[OptionsDefine.Language]:
1136
1807
  profile.language = g_param[OptionsDefine.Language]
1137
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1138
1809
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1139
1810
  client._sdkVersion += ("_CLI_" + __version__)
1140
1811
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1141
- model = models.DescribeDatahubTopicsRequest()
1812
+ model = models.ModifyPasswordRequest()
1142
1813
  model.from_json_string(json.dumps(args))
1143
1814
  start_time = time.time()
1144
1815
  while True:
1145
- rsp = client.DescribeDatahubTopics(model)
1816
+ rsp = client.ModifyPassword(model)
1146
1817
  result = rsp.to_json_string()
1147
1818
  try:
1148
1819
  json_obj = json.loads(result)
@@ -1161,7 +1832,7 @@ def doDescribeDatahubTopics(args, parsed_globals):
1161
1832
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1162
1833
 
1163
1834
 
1164
- def doDescribeTopicDetail(args, parsed_globals):
1835
+ def doDescribeConsumerGroup(args, parsed_globals):
1165
1836
  g_param = parse_global_arg(parsed_globals)
1166
1837
 
1167
1838
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1171,7 +1842,10 @@ def doDescribeTopicDetail(args, parsed_globals):
1171
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1844
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1850
  else:
1177
1851
  cred = credential.Credential(
@@ -1183,18 +1857,18 @@ def doDescribeTopicDetail(args, parsed_globals):
1183
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1859
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1861
  if g_param[OptionsDefine.Language]:
1188
1862
  profile.language = g_param[OptionsDefine.Language]
1189
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1190
1864
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1191
1865
  client._sdkVersion += ("_CLI_" + __version__)
1192
1866
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1193
- model = models.DescribeTopicDetailRequest()
1867
+ model = models.DescribeConsumerGroupRequest()
1194
1868
  model.from_json_string(json.dumps(args))
1195
1869
  start_time = time.time()
1196
1870
  while True:
1197
- rsp = client.DescribeTopicDetail(model)
1871
+ rsp = client.DescribeConsumerGroup(model)
1198
1872
  result = rsp.to_json_string()
1199
1873
  try:
1200
1874
  json_obj = json.loads(result)
@@ -1213,7 +1887,7 @@ def doDescribeTopicDetail(args, parsed_globals):
1213
1887
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
1888
 
1215
1889
 
1216
- def doFetchMessageByOffset(args, parsed_globals):
1890
+ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1217
1891
  g_param = parse_global_arg(parsed_globals)
1218
1892
 
1219
1893
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1223,7 +1897,10 @@ def doFetchMessageByOffset(args, parsed_globals):
1223
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1899
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1905
  else:
1229
1906
  cred = credential.Credential(
@@ -1235,18 +1912,18 @@ def doFetchMessageByOffset(args, parsed_globals):
1235
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1914
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1916
  if g_param[OptionsDefine.Language]:
1240
1917
  profile.language = g_param[OptionsDefine.Language]
1241
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1242
1919
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1243
1920
  client._sdkVersion += ("_CLI_" + __version__)
1244
1921
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1245
- model = models.FetchMessageByOffsetRequest()
1922
+ model = models.DescribeTopicSubscribeGroupRequest()
1246
1923
  model.from_json_string(json.dumps(args))
1247
1924
  start_time = time.time()
1248
1925
  while True:
1249
- rsp = client.FetchMessageByOffset(model)
1926
+ rsp = client.DescribeTopicSubscribeGroup(model)
1250
1927
  result = rsp.to_json_string()
1251
1928
  try:
1252
1929
  json_obj = json.loads(result)
@@ -1265,7 +1942,7 @@ def doFetchMessageByOffset(args, parsed_globals):
1265
1942
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
1943
 
1267
1944
 
1268
- def doDeleteTopicIpWhiteList(args, parsed_globals):
1945
+ def doModifyRoutineMaintenanceTask(args, parsed_globals):
1269
1946
  g_param = parse_global_arg(parsed_globals)
1270
1947
 
1271
1948
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1275,7 +1952,10 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
1275
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1954
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1960
  else:
1281
1961
  cred = credential.Credential(
@@ -1287,18 +1967,18 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
1287
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1969
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1971
  if g_param[OptionsDefine.Language]:
1292
1972
  profile.language = g_param[OptionsDefine.Language]
1293
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1294
1974
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1295
1975
  client._sdkVersion += ("_CLI_" + __version__)
1296
1976
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1297
- model = models.DeleteTopicIpWhiteListRequest()
1977
+ model = models.ModifyRoutineMaintenanceTaskRequest()
1298
1978
  model.from_json_string(json.dumps(args))
1299
1979
  start_time = time.time()
1300
1980
  while True:
1301
- rsp = client.DeleteTopicIpWhiteList(model)
1981
+ rsp = client.ModifyRoutineMaintenanceTask(model)
1302
1982
  result = rsp.to_json_string()
1303
1983
  try:
1304
1984
  json_obj = json.loads(result)
@@ -1317,7 +1997,7 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
1317
1997
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
1998
 
1319
1999
 
1320
- def doModifyPassword(args, parsed_globals):
2000
+ def doDeleteRouteTriggerTime(args, parsed_globals):
1321
2001
  g_param = parse_global_arg(parsed_globals)
1322
2002
 
1323
2003
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1327,7 +2007,10 @@ def doModifyPassword(args, parsed_globals):
1327
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
2009
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
2015
  else:
1333
2016
  cred = credential.Credential(
@@ -1339,18 +2022,18 @@ def doModifyPassword(args, parsed_globals):
1339
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1340
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
2024
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
2026
  if g_param[OptionsDefine.Language]:
1344
2027
  profile.language = g_param[OptionsDefine.Language]
1345
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1346
2029
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1347
2030
  client._sdkVersion += ("_CLI_" + __version__)
1348
2031
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1349
- model = models.ModifyPasswordRequest()
2032
+ model = models.DeleteRouteTriggerTimeRequest()
1350
2033
  model.from_json_string(json.dumps(args))
1351
2034
  start_time = time.time()
1352
2035
  while True:
1353
- rsp = client.ModifyPassword(model)
2036
+ rsp = client.DeleteRouteTriggerTime(model)
1354
2037
  result = rsp.to_json_string()
1355
2038
  try:
1356
2039
  json_obj = json.loads(result)
@@ -1369,7 +2052,7 @@ def doModifyPassword(args, parsed_globals):
1369
2052
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1370
2053
 
1371
2054
 
1372
- def doDescribeConsumerGroup(args, parsed_globals):
2055
+ def doCreatePartition(args, parsed_globals):
1373
2056
  g_param = parse_global_arg(parsed_globals)
1374
2057
 
1375
2058
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1379,7 +2062,10 @@ def doDescribeConsumerGroup(args, parsed_globals):
1379
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
2064
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
2070
  else:
1385
2071
  cred = credential.Credential(
@@ -1391,18 +2077,18 @@ def doDescribeConsumerGroup(args, parsed_globals):
1391
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1392
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
2079
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
2081
  if g_param[OptionsDefine.Language]:
1396
2082
  profile.language = g_param[OptionsDefine.Language]
1397
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1398
2084
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1399
2085
  client._sdkVersion += ("_CLI_" + __version__)
1400
2086
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
- model = models.DescribeConsumerGroupRequest()
2087
+ model = models.CreatePartitionRequest()
1402
2088
  model.from_json_string(json.dumps(args))
1403
2089
  start_time = time.time()
1404
2090
  while True:
1405
- rsp = client.DescribeConsumerGroup(model)
2091
+ rsp = client.CreatePartition(model)
1406
2092
  result = rsp.to_json_string()
1407
2093
  try:
1408
2094
  json_obj = json.loads(result)
@@ -1421,7 +2107,7 @@ def doDescribeConsumerGroup(args, parsed_globals):
1421
2107
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
2108
 
1423
2109
 
1424
- def doDescribeTopicSubscribeGroup(args, parsed_globals):
2110
+ def doCreateUser(args, parsed_globals):
1425
2111
  g_param = parse_global_arg(parsed_globals)
1426
2112
 
1427
2113
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1431,7 +2117,10 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1431
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
2119
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
2125
  else:
1437
2126
  cred = credential.Credential(
@@ -1443,18 +2132,18 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1443
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1444
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
2134
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
2136
  if g_param[OptionsDefine.Language]:
1448
2137
  profile.language = g_param[OptionsDefine.Language]
1449
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1450
2139
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1451
2140
  client._sdkVersion += ("_CLI_" + __version__)
1452
2141
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.DescribeTopicSubscribeGroupRequest()
2142
+ model = models.CreateUserRequest()
1454
2143
  model.from_json_string(json.dumps(args))
1455
2144
  start_time = time.time()
1456
2145
  while True:
1457
- rsp = client.DescribeTopicSubscribeGroup(model)
2146
+ rsp = client.CreateUser(model)
1458
2147
  result = rsp.to_json_string()
1459
2148
  try:
1460
2149
  json_obj = json.loads(result)
@@ -1473,7 +2162,7 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1473
2162
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1474
2163
 
1475
2164
 
1476
- def doDeleteRouteTriggerTime(args, parsed_globals):
2165
+ def doDescribeTaskStatus(args, parsed_globals):
1477
2166
  g_param = parse_global_arg(parsed_globals)
1478
2167
 
1479
2168
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1483,7 +2172,10 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
1483
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
2174
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
2180
  else:
1489
2181
  cred = credential.Credential(
@@ -1495,18 +2187,18 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
1495
2187
  endpoint=g_param[OptionsDefine.Endpoint],
1496
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
2189
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
2191
  if g_param[OptionsDefine.Language]:
1500
2192
  profile.language = g_param[OptionsDefine.Language]
1501
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1502
2194
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1503
2195
  client._sdkVersion += ("_CLI_" + __version__)
1504
2196
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1505
- model = models.DeleteRouteTriggerTimeRequest()
2197
+ model = models.DescribeTaskStatusRequest()
1506
2198
  model.from_json_string(json.dumps(args))
1507
2199
  start_time = time.time()
1508
2200
  while True:
1509
- rsp = client.DeleteRouteTriggerTime(model)
2201
+ rsp = client.DescribeTaskStatus(model)
1510
2202
  result = rsp.to_json_string()
1511
2203
  try:
1512
2204
  json_obj = json.loads(result)
@@ -1525,7 +2217,7 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
1525
2217
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1526
2218
 
1527
2219
 
1528
- def doCreatePartition(args, parsed_globals):
2220
+ def doBatchModifyGroupOffsets(args, parsed_globals):
1529
2221
  g_param = parse_global_arg(parsed_globals)
1530
2222
 
1531
2223
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1535,7 +2227,10 @@ def doCreatePartition(args, parsed_globals):
1535
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
2229
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
2235
  else:
1541
2236
  cred = credential.Credential(
@@ -1547,18 +2242,18 @@ def doCreatePartition(args, parsed_globals):
1547
2242
  endpoint=g_param[OptionsDefine.Endpoint],
1548
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
2244
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
2246
  if g_param[OptionsDefine.Language]:
1552
2247
  profile.language = g_param[OptionsDefine.Language]
1553
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1554
2249
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1555
2250
  client._sdkVersion += ("_CLI_" + __version__)
1556
2251
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1557
- model = models.CreatePartitionRequest()
2252
+ model = models.BatchModifyGroupOffsetsRequest()
1558
2253
  model.from_json_string(json.dumps(args))
1559
2254
  start_time = time.time()
1560
2255
  while True:
1561
- rsp = client.CreatePartition(model)
2256
+ rsp = client.BatchModifyGroupOffsets(model)
1562
2257
  result = rsp.to_json_string()
1563
2258
  try:
1564
2259
  json_obj = json.loads(result)
@@ -1577,7 +2272,7 @@ def doCreatePartition(args, parsed_globals):
1577
2272
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1578
2273
 
1579
2274
 
1580
- def doCreateUser(args, parsed_globals):
2275
+ def doDeleteAcl(args, parsed_globals):
1581
2276
  g_param = parse_global_arg(parsed_globals)
1582
2277
 
1583
2278
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1587,7 +2282,10 @@ def doCreateUser(args, parsed_globals):
1587
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
2284
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
2290
  else:
1593
2291
  cred = credential.Credential(
@@ -1599,18 +2297,18 @@ def doCreateUser(args, parsed_globals):
1599
2297
  endpoint=g_param[OptionsDefine.Endpoint],
1600
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
2299
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
2301
  if g_param[OptionsDefine.Language]:
1604
2302
  profile.language = g_param[OptionsDefine.Language]
1605
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1606
2304
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1607
2305
  client._sdkVersion += ("_CLI_" + __version__)
1608
2306
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1609
- model = models.CreateUserRequest()
2307
+ model = models.DeleteAclRequest()
1610
2308
  model.from_json_string(json.dumps(args))
1611
2309
  start_time = time.time()
1612
2310
  while True:
1613
- rsp = client.CreateUser(model)
2311
+ rsp = client.DeleteAcl(model)
1614
2312
  result = rsp.to_json_string()
1615
2313
  try:
1616
2314
  json_obj = json.loads(result)
@@ -1629,7 +2327,7 @@ def doCreateUser(args, parsed_globals):
1629
2327
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1630
2328
 
1631
2329
 
1632
- def doDescribeTaskStatus(args, parsed_globals):
2330
+ def doInstanceScalingDown(args, parsed_globals):
1633
2331
  g_param = parse_global_arg(parsed_globals)
1634
2332
 
1635
2333
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1639,7 +2337,10 @@ def doDescribeTaskStatus(args, parsed_globals):
1639
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
2339
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
2345
  else:
1645
2346
  cred = credential.Credential(
@@ -1651,18 +2352,18 @@ def doDescribeTaskStatus(args, parsed_globals):
1651
2352
  endpoint=g_param[OptionsDefine.Endpoint],
1652
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
2354
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
2356
  if g_param[OptionsDefine.Language]:
1656
2357
  profile.language = g_param[OptionsDefine.Language]
1657
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1658
2359
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1659
2360
  client._sdkVersion += ("_CLI_" + __version__)
1660
2361
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1661
- model = models.DescribeTaskStatusRequest()
2362
+ model = models.InstanceScalingDownRequest()
1662
2363
  model.from_json_string(json.dumps(args))
1663
2364
  start_time = time.time()
1664
2365
  while True:
1665
- rsp = client.DescribeTaskStatus(model)
2366
+ rsp = client.InstanceScalingDown(model)
1666
2367
  result = rsp.to_json_string()
1667
2368
  try:
1668
2369
  json_obj = json.loads(result)
@@ -1681,7 +2382,7 @@ def doDescribeTaskStatus(args, parsed_globals):
1681
2382
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1682
2383
 
1683
2384
 
1684
- def doBatchModifyGroupOffsets(args, parsed_globals):
2385
+ def doDescribeGroupOffsets(args, parsed_globals):
1685
2386
  g_param = parse_global_arg(parsed_globals)
1686
2387
 
1687
2388
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1691,7 +2392,10 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
1691
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
2394
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
2400
  else:
1697
2401
  cred = credential.Credential(
@@ -1703,18 +2407,18 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
1703
2407
  endpoint=g_param[OptionsDefine.Endpoint],
1704
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
2409
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
2411
  if g_param[OptionsDefine.Language]:
1708
2412
  profile.language = g_param[OptionsDefine.Language]
1709
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1710
2414
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1711
2415
  client._sdkVersion += ("_CLI_" + __version__)
1712
2416
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1713
- model = models.BatchModifyGroupOffsetsRequest()
2417
+ model = models.DescribeGroupOffsetsRequest()
1714
2418
  model.from_json_string(json.dumps(args))
1715
2419
  start_time = time.time()
1716
2420
  while True:
1717
- rsp = client.BatchModifyGroupOffsets(model)
2421
+ rsp = client.DescribeGroupOffsets(model)
1718
2422
  result = rsp.to_json_string()
1719
2423
  try:
1720
2424
  json_obj = json.loads(result)
@@ -1733,7 +2437,7 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
1733
2437
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1734
2438
 
1735
2439
 
1736
- def doDeleteAcl(args, parsed_globals):
2440
+ def doDeleteInstancePre(args, parsed_globals):
1737
2441
  g_param = parse_global_arg(parsed_globals)
1738
2442
 
1739
2443
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1743,7 +2447,10 @@ def doDeleteAcl(args, parsed_globals):
1743
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
2449
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
2455
  else:
1749
2456
  cred = credential.Credential(
@@ -1755,18 +2462,18 @@ def doDeleteAcl(args, parsed_globals):
1755
2462
  endpoint=g_param[OptionsDefine.Endpoint],
1756
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
2464
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
2466
  if g_param[OptionsDefine.Language]:
1760
2467
  profile.language = g_param[OptionsDefine.Language]
1761
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1762
2469
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1763
2470
  client._sdkVersion += ("_CLI_" + __version__)
1764
2471
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1765
- model = models.DeleteAclRequest()
2472
+ model = models.DeleteInstancePreRequest()
1766
2473
  model.from_json_string(json.dumps(args))
1767
2474
  start_time = time.time()
1768
2475
  while True:
1769
- rsp = client.DeleteAcl(model)
2476
+ rsp = client.DeleteInstancePre(model)
1770
2477
  result = rsp.to_json_string()
1771
2478
  try:
1772
2479
  json_obj = json.loads(result)
@@ -1785,7 +2492,7 @@ def doDeleteAcl(args, parsed_globals):
1785
2492
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1786
2493
 
1787
2494
 
1788
- def doDescribeAppInfo(args, parsed_globals):
2495
+ def doDescribeInstanceAttributes(args, parsed_globals):
1789
2496
  g_param = parse_global_arg(parsed_globals)
1790
2497
 
1791
2498
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1795,7 +2502,10 @@ def doDescribeAppInfo(args, parsed_globals):
1795
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
2504
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
2510
  else:
1801
2511
  cred = credential.Credential(
@@ -1807,18 +2517,18 @@ def doDescribeAppInfo(args, parsed_globals):
1807
2517
  endpoint=g_param[OptionsDefine.Endpoint],
1808
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
2519
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
2521
  if g_param[OptionsDefine.Language]:
1812
2522
  profile.language = g_param[OptionsDefine.Language]
1813
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1814
2524
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1815
2525
  client._sdkVersion += ("_CLI_" + __version__)
1816
2526
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1817
- model = models.DescribeAppInfoRequest()
2527
+ model = models.DescribeInstanceAttributesRequest()
1818
2528
  model.from_json_string(json.dumps(args))
1819
2529
  start_time = time.time()
1820
2530
  while True:
1821
- rsp = client.DescribeAppInfo(model)
2531
+ rsp = client.DescribeInstanceAttributes(model)
1822
2532
  result = rsp.to_json_string()
1823
2533
  try:
1824
2534
  json_obj = json.loads(result)
@@ -1837,7 +2547,7 @@ def doDescribeAppInfo(args, parsed_globals):
1837
2547
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1838
2548
 
1839
2549
 
1840
- def doDescribeGroupOffsets(args, parsed_globals):
2550
+ def doDescribeInstancesDetail(args, parsed_globals):
1841
2551
  g_param = parse_global_arg(parsed_globals)
1842
2552
 
1843
2553
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1847,7 +2557,10 @@ def doDescribeGroupOffsets(args, parsed_globals):
1847
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2559
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2565
  else:
1853
2566
  cred = credential.Credential(
@@ -1859,18 +2572,18 @@ def doDescribeGroupOffsets(args, parsed_globals):
1859
2572
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2574
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2576
  if g_param[OptionsDefine.Language]:
1864
2577
  profile.language = g_param[OptionsDefine.Language]
1865
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1866
2579
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1867
2580
  client._sdkVersion += ("_CLI_" + __version__)
1868
2581
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1869
- model = models.DescribeGroupOffsetsRequest()
2582
+ model = models.DescribeInstancesDetailRequest()
1870
2583
  model.from_json_string(json.dumps(args))
1871
2584
  start_time = time.time()
1872
2585
  while True:
1873
- rsp = client.DescribeGroupOffsets(model)
2586
+ rsp = client.DescribeInstancesDetail(model)
1874
2587
  result = rsp.to_json_string()
1875
2588
  try:
1876
2589
  json_obj = json.loads(result)
@@ -1889,7 +2602,7 @@ def doDescribeGroupOffsets(args, parsed_globals):
1889
2602
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
2603
 
1891
2604
 
1892
- def doDeleteInstancePre(args, parsed_globals):
2605
+ def doBatchCreateAcl(args, parsed_globals):
1893
2606
  g_param = parse_global_arg(parsed_globals)
1894
2607
 
1895
2608
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1899,7 +2612,10 @@ def doDeleteInstancePre(args, parsed_globals):
1899
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2614
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2620
  else:
1905
2621
  cred = credential.Credential(
@@ -1911,18 +2627,18 @@ def doDeleteInstancePre(args, parsed_globals):
1911
2627
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2629
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2631
  if g_param[OptionsDefine.Language]:
1916
2632
  profile.language = g_param[OptionsDefine.Language]
1917
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1918
2634
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1919
2635
  client._sdkVersion += ("_CLI_" + __version__)
1920
2636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1921
- model = models.DeleteInstancePreRequest()
2637
+ model = models.BatchCreateAclRequest()
1922
2638
  model.from_json_string(json.dumps(args))
1923
2639
  start_time = time.time()
1924
2640
  while True:
1925
- rsp = client.DeleteInstancePre(model)
2641
+ rsp = client.BatchCreateAcl(model)
1926
2642
  result = rsp.to_json_string()
1927
2643
  try:
1928
2644
  json_obj = json.loads(result)
@@ -1941,7 +2657,7 @@ def doDeleteInstancePre(args, parsed_globals):
1941
2657
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1942
2658
 
1943
2659
 
1944
- def doDescribeInstanceAttributes(args, parsed_globals):
2660
+ def doDeleteAclRule(args, parsed_globals):
1945
2661
  g_param = parse_global_arg(parsed_globals)
1946
2662
 
1947
2663
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1951,7 +2667,10 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1951
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2669
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2675
  else:
1957
2676
  cred = credential.Credential(
@@ -1963,18 +2682,18 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1963
2682
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2684
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2686
  if g_param[OptionsDefine.Language]:
1968
2687
  profile.language = g_param[OptionsDefine.Language]
1969
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1970
2689
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1971
2690
  client._sdkVersion += ("_CLI_" + __version__)
1972
2691
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1973
- model = models.DescribeInstanceAttributesRequest()
2692
+ model = models.DeleteAclRuleRequest()
1974
2693
  model.from_json_string(json.dumps(args))
1975
2694
  start_time = time.time()
1976
2695
  while True:
1977
- rsp = client.DescribeInstanceAttributes(model)
2696
+ rsp = client.DeleteAclRule(model)
1978
2697
  result = rsp.to_json_string()
1979
2698
  try:
1980
2699
  json_obj = json.loads(result)
@@ -1993,7 +2712,7 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1993
2712
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1994
2713
 
1995
2714
 
1996
- def doDescribeInstancesDetail(args, parsed_globals):
2715
+ def doModifyAclRule(args, parsed_globals):
1997
2716
  g_param = parse_global_arg(parsed_globals)
1998
2717
 
1999
2718
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2003,7 +2722,10 @@ def doDescribeInstancesDetail(args, parsed_globals):
2003
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2724
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2730
  else:
2009
2731
  cred = credential.Credential(
@@ -2015,18 +2737,18 @@ def doDescribeInstancesDetail(args, parsed_globals):
2015
2737
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2739
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2741
  if g_param[OptionsDefine.Language]:
2020
2742
  profile.language = g_param[OptionsDefine.Language]
2021
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2022
2744
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2023
2745
  client._sdkVersion += ("_CLI_" + __version__)
2024
2746
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2025
- model = models.DescribeInstancesDetailRequest()
2747
+ model = models.ModifyAclRuleRequest()
2026
2748
  model.from_json_string(json.dumps(args))
2027
2749
  start_time = time.time()
2028
2750
  while True:
2029
- rsp = client.DescribeInstancesDetail(model)
2751
+ rsp = client.ModifyAclRule(model)
2030
2752
  result = rsp.to_json_string()
2031
2753
  try:
2032
2754
  json_obj = json.loads(result)
@@ -2045,7 +2767,7 @@ def doDescribeInstancesDetail(args, parsed_globals):
2045
2767
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2046
2768
 
2047
2769
 
2048
- def doBatchCreateAcl(args, parsed_globals):
2770
+ def doDeleteUser(args, parsed_globals):
2049
2771
  g_param = parse_global_arg(parsed_globals)
2050
2772
 
2051
2773
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2055,7 +2777,10 @@ def doBatchCreateAcl(args, parsed_globals):
2055
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2779
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2785
  else:
2061
2786
  cred = credential.Credential(
@@ -2067,18 +2792,18 @@ def doBatchCreateAcl(args, parsed_globals):
2067
2792
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2794
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2796
  if g_param[OptionsDefine.Language]:
2072
2797
  profile.language = g_param[OptionsDefine.Language]
2073
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2074
2799
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2075
2800
  client._sdkVersion += ("_CLI_" + __version__)
2076
2801
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2077
- model = models.BatchCreateAclRequest()
2802
+ model = models.DeleteUserRequest()
2078
2803
  model.from_json_string(json.dumps(args))
2079
2804
  start_time = time.time()
2080
2805
  while True:
2081
- rsp = client.BatchCreateAcl(model)
2806
+ rsp = client.DeleteUser(model)
2082
2807
  result = rsp.to_json_string()
2083
2808
  try:
2084
2809
  json_obj = json.loads(result)
@@ -2097,7 +2822,7 @@ def doBatchCreateAcl(args, parsed_globals):
2097
2822
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2098
2823
 
2099
2824
 
2100
- def doModifyAclRule(args, parsed_globals):
2825
+ def doDescribeTopicSyncReplica(args, parsed_globals):
2101
2826
  g_param = parse_global_arg(parsed_globals)
2102
2827
 
2103
2828
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2107,7 +2832,10 @@ def doModifyAclRule(args, parsed_globals):
2107
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2834
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2840
  else:
2113
2841
  cred = credential.Credential(
@@ -2119,18 +2847,18 @@ def doModifyAclRule(args, parsed_globals):
2119
2847
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2849
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2851
  if g_param[OptionsDefine.Language]:
2124
2852
  profile.language = g_param[OptionsDefine.Language]
2125
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2126
2854
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2127
2855
  client._sdkVersion += ("_CLI_" + __version__)
2128
2856
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2129
- model = models.ModifyAclRuleRequest()
2857
+ model = models.DescribeTopicSyncReplicaRequest()
2130
2858
  model.from_json_string(json.dumps(args))
2131
2859
  start_time = time.time()
2132
2860
  while True:
2133
- rsp = client.ModifyAclRule(model)
2861
+ rsp = client.DescribeTopicSyncReplica(model)
2134
2862
  result = rsp.to_json_string()
2135
2863
  try:
2136
2864
  json_obj = json.loads(result)
@@ -2149,7 +2877,7 @@ def doModifyAclRule(args, parsed_globals):
2149
2877
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2150
2878
 
2151
2879
 
2152
- def doDeleteUser(args, parsed_globals):
2880
+ def doDescribeTopicAttributes(args, parsed_globals):
2153
2881
  g_param = parse_global_arg(parsed_globals)
2154
2882
 
2155
2883
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2159,7 +2887,10 @@ def doDeleteUser(args, parsed_globals):
2159
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2889
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2895
  else:
2165
2896
  cred = credential.Credential(
@@ -2171,18 +2902,18 @@ def doDeleteUser(args, parsed_globals):
2171
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2172
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
2904
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
2906
  if g_param[OptionsDefine.Language]:
2176
2907
  profile.language = g_param[OptionsDefine.Language]
2177
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2178
2909
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2179
2910
  client._sdkVersion += ("_CLI_" + __version__)
2180
2911
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2181
- model = models.DeleteUserRequest()
2912
+ model = models.DescribeTopicAttributesRequest()
2182
2913
  model.from_json_string(json.dumps(args))
2183
2914
  start_time = time.time()
2184
2915
  while True:
2185
- rsp = client.DeleteUser(model)
2916
+ rsp = client.DescribeTopicAttributes(model)
2186
2917
  result = rsp.to_json_string()
2187
2918
  try:
2188
2919
  json_obj = json.loads(result)
@@ -2201,7 +2932,7 @@ def doDeleteUser(args, parsed_globals):
2201
2932
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2202
2933
 
2203
2934
 
2204
- def doDescribeTopicSyncReplica(args, parsed_globals):
2935
+ def doFetchMessageListByTimestamp(args, parsed_globals):
2205
2936
  g_param = parse_global_arg(parsed_globals)
2206
2937
 
2207
2938
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2211,7 +2942,10 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2211
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2944
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2950
  else:
2217
2951
  cred = credential.Credential(
@@ -2223,18 +2957,18 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2223
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2224
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
2959
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
2961
  if g_param[OptionsDefine.Language]:
2228
2962
  profile.language = g_param[OptionsDefine.Language]
2229
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2230
2964
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2231
2965
  client._sdkVersion += ("_CLI_" + __version__)
2232
2966
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2233
- model = models.DescribeTopicSyncReplicaRequest()
2967
+ model = models.FetchMessageListByTimestampRequest()
2234
2968
  model.from_json_string(json.dumps(args))
2235
2969
  start_time = time.time()
2236
2970
  while True:
2237
- rsp = client.DescribeTopicSyncReplica(model)
2971
+ rsp = client.FetchMessageListByTimestamp(model)
2238
2972
  result = rsp.to_json_string()
2239
2973
  try:
2240
2974
  json_obj = json.loads(result)
@@ -2253,7 +2987,7 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2253
2987
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2254
2988
 
2255
2989
 
2256
- def doDescribeTopicAttributes(args, parsed_globals):
2990
+ def doDescribeTopicProduceConnection(args, parsed_globals):
2257
2991
  g_param = parse_global_arg(parsed_globals)
2258
2992
 
2259
2993
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2263,7 +2997,10 @@ def doDescribeTopicAttributes(args, parsed_globals):
2263
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
2999
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
3005
  else:
2269
3006
  cred = credential.Credential(
@@ -2275,18 +3012,18 @@ def doDescribeTopicAttributes(args, parsed_globals):
2275
3012
  endpoint=g_param[OptionsDefine.Endpoint],
2276
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
3014
  )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2279
3016
  if g_param[OptionsDefine.Language]:
2280
3017
  profile.language = g_param[OptionsDefine.Language]
2281
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2282
3019
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2283
3020
  client._sdkVersion += ("_CLI_" + __version__)
2284
3021
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2285
- model = models.DescribeTopicAttributesRequest()
3022
+ model = models.DescribeTopicProduceConnectionRequest()
2286
3023
  model.from_json_string(json.dumps(args))
2287
3024
  start_time = time.time()
2288
3025
  while True:
2289
- rsp = client.DescribeTopicAttributes(model)
3026
+ rsp = client.DescribeTopicProduceConnection(model)
2290
3027
  result = rsp.to_json_string()
2291
3028
  try:
2292
3029
  json_obj = json.loads(result)
@@ -2305,7 +3042,7 @@ def doDescribeTopicAttributes(args, parsed_globals):
2305
3042
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2306
3043
 
2307
3044
 
2308
- def doDescribeTopicProduceConnection(args, parsed_globals):
3045
+ def doCreatePostPaidInstance(args, parsed_globals):
2309
3046
  g_param = parse_global_arg(parsed_globals)
2310
3047
 
2311
3048
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2315,7 +3052,10 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
2315
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
3054
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
3060
  else:
2321
3061
  cred = credential.Credential(
@@ -2327,18 +3067,18 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
2327
3067
  endpoint=g_param[OptionsDefine.Endpoint],
2328
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
3069
  )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2331
3071
  if g_param[OptionsDefine.Language]:
2332
3072
  profile.language = g_param[OptionsDefine.Language]
2333
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2334
3074
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2335
3075
  client._sdkVersion += ("_CLI_" + __version__)
2336
3076
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2337
- model = models.DescribeTopicProduceConnectionRequest()
3077
+ model = models.CreatePostPaidInstanceRequest()
2338
3078
  model.from_json_string(json.dumps(args))
2339
3079
  start_time = time.time()
2340
3080
  while True:
2341
- rsp = client.DescribeTopicProduceConnection(model)
3081
+ rsp = client.CreatePostPaidInstance(model)
2342
3082
  result = rsp.to_json_string()
2343
3083
  try:
2344
3084
  json_obj = json.loads(result)
@@ -2357,7 +3097,7 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
2357
3097
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2358
3098
 
2359
3099
 
2360
- def doCreatePostPaidInstance(args, parsed_globals):
3100
+ def doCreateAclRule(args, parsed_globals):
2361
3101
  g_param = parse_global_arg(parsed_globals)
2362
3102
 
2363
3103
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2367,7 +3107,10 @@ def doCreatePostPaidInstance(args, parsed_globals):
2367
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
3109
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
3115
  else:
2373
3116
  cred = credential.Credential(
@@ -2379,18 +3122,18 @@ def doCreatePostPaidInstance(args, parsed_globals):
2379
3122
  endpoint=g_param[OptionsDefine.Endpoint],
2380
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
3124
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
3126
  if g_param[OptionsDefine.Language]:
2384
3127
  profile.language = g_param[OptionsDefine.Language]
2385
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2386
3129
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2387
3130
  client._sdkVersion += ("_CLI_" + __version__)
2388
3131
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
- model = models.CreatePostPaidInstanceRequest()
3132
+ model = models.CreateAclRuleRequest()
2390
3133
  model.from_json_string(json.dumps(args))
2391
3134
  start_time = time.time()
2392
3135
  while True:
2393
- rsp = client.CreatePostPaidInstance(model)
3136
+ rsp = client.CreateAclRule(model)
2394
3137
  result = rsp.to_json_string()
2395
3138
  try:
2396
3139
  json_obj = json.loads(result)
@@ -2409,7 +3152,7 @@ def doCreatePostPaidInstance(args, parsed_globals):
2409
3152
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
3153
 
2411
3154
 
2412
- def doCreateAclRule(args, parsed_globals):
3155
+ def doModifyInstanceAttributes(args, parsed_globals):
2413
3156
  g_param = parse_global_arg(parsed_globals)
2414
3157
 
2415
3158
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2419,7 +3162,10 @@ def doCreateAclRule(args, parsed_globals):
2419
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
3164
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
3170
  else:
2425
3171
  cred = credential.Credential(
@@ -2431,18 +3177,18 @@ def doCreateAclRule(args, parsed_globals):
2431
3177
  endpoint=g_param[OptionsDefine.Endpoint],
2432
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
3179
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
3181
  if g_param[OptionsDefine.Language]:
2436
3182
  profile.language = g_param[OptionsDefine.Language]
2437
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2438
3184
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2439
3185
  client._sdkVersion += ("_CLI_" + __version__)
2440
3186
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2441
- model = models.CreateAclRuleRequest()
3187
+ model = models.ModifyInstanceAttributesRequest()
2442
3188
  model.from_json_string(json.dumps(args))
2443
3189
  start_time = time.time()
2444
3190
  while True:
2445
- rsp = client.CreateAclRule(model)
3191
+ rsp = client.ModifyInstanceAttributes(model)
2446
3192
  result = rsp.to_json_string()
2447
3193
  try:
2448
3194
  json_obj = json.loads(result)
@@ -2461,7 +3207,7 @@ def doCreateAclRule(args, parsed_globals):
2461
3207
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2462
3208
 
2463
3209
 
2464
- def doDescribeDatahubTopic(args, parsed_globals):
3210
+ def doDescribeCkafkaZone(args, parsed_globals):
2465
3211
  g_param = parse_global_arg(parsed_globals)
2466
3212
 
2467
3213
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2471,7 +3217,10 @@ def doDescribeDatahubTopic(args, parsed_globals):
2471
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
3219
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
3225
  else:
2477
3226
  cred = credential.Credential(
@@ -2483,18 +3232,18 @@ def doDescribeDatahubTopic(args, parsed_globals):
2483
3232
  endpoint=g_param[OptionsDefine.Endpoint],
2484
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
3234
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
3236
  if g_param[OptionsDefine.Language]:
2488
3237
  profile.language = g_param[OptionsDefine.Language]
2489
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2490
3239
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2491
3240
  client._sdkVersion += ("_CLI_" + __version__)
2492
3241
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2493
- model = models.DescribeDatahubTopicRequest()
3242
+ model = models.DescribeCkafkaZoneRequest()
2494
3243
  model.from_json_string(json.dumps(args))
2495
3244
  start_time = time.time()
2496
3245
  while True:
2497
- rsp = client.DescribeDatahubTopic(model)
3246
+ rsp = client.DescribeCkafkaZone(model)
2498
3247
  result = rsp.to_json_string()
2499
3248
  try:
2500
3249
  json_obj = json.loads(result)
@@ -2513,7 +3262,7 @@ def doDescribeDatahubTopic(args, parsed_globals):
2513
3262
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2514
3263
 
2515
3264
 
2516
- def doDescribeCkafkaZone(args, parsed_globals):
3265
+ def doDescribeRegion(args, parsed_globals):
2517
3266
  g_param = parse_global_arg(parsed_globals)
2518
3267
 
2519
3268
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2523,7 +3272,10 @@ def doDescribeCkafkaZone(args, parsed_globals):
2523
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
3274
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
3280
  else:
2529
3281
  cred = credential.Credential(
@@ -2535,18 +3287,18 @@ def doDescribeCkafkaZone(args, parsed_globals):
2535
3287
  endpoint=g_param[OptionsDefine.Endpoint],
2536
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
3289
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
3291
  if g_param[OptionsDefine.Language]:
2540
3292
  profile.language = g_param[OptionsDefine.Language]
2541
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2542
3294
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2543
3295
  client._sdkVersion += ("_CLI_" + __version__)
2544
3296
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2545
- model = models.DescribeCkafkaZoneRequest()
3297
+ model = models.DescribeRegionRequest()
2546
3298
  model.from_json_string(json.dumps(args))
2547
3299
  start_time = time.time()
2548
3300
  while True:
2549
- rsp = client.DescribeCkafkaZone(model)
3301
+ rsp = client.DescribeRegion(model)
2550
3302
  result = rsp.to_json_string()
2551
3303
  try:
2552
3304
  json_obj = json.loads(result)
@@ -2565,7 +3317,7 @@ def doDescribeCkafkaZone(args, parsed_globals):
2565
3317
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2566
3318
 
2567
3319
 
2568
- def doDescribeRegion(args, parsed_globals):
3320
+ def doDescribeTopic(args, parsed_globals):
2569
3321
  g_param = parse_global_arg(parsed_globals)
2570
3322
 
2571
3323
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2575,7 +3327,10 @@ def doDescribeRegion(args, parsed_globals):
2575
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
3329
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
3335
  else:
2581
3336
  cred = credential.Credential(
@@ -2587,18 +3342,18 @@ def doDescribeRegion(args, parsed_globals):
2587
3342
  endpoint=g_param[OptionsDefine.Endpoint],
2588
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
3344
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
3346
  if g_param[OptionsDefine.Language]:
2592
3347
  profile.language = g_param[OptionsDefine.Language]
2593
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2594
3349
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2595
3350
  client._sdkVersion += ("_CLI_" + __version__)
2596
3351
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2597
- model = models.DescribeRegionRequest()
3352
+ model = models.DescribeTopicRequest()
2598
3353
  model.from_json_string(json.dumps(args))
2599
3354
  start_time = time.time()
2600
3355
  while True:
2601
- rsp = client.DescribeRegion(model)
3356
+ rsp = client.DescribeTopic(model)
2602
3357
  result = rsp.to_json_string()
2603
3358
  try:
2604
3359
  json_obj = json.loads(result)
@@ -2617,7 +3372,7 @@ def doDescribeRegion(args, parsed_globals):
2617
3372
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2618
3373
 
2619
3374
 
2620
- def doDescribeTopic(args, parsed_globals):
3375
+ def doModifyInstancePre(args, parsed_globals):
2621
3376
  g_param = parse_global_arg(parsed_globals)
2622
3377
 
2623
3378
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2627,7 +3382,10 @@ def doDescribeTopic(args, parsed_globals):
2627
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
3384
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
3390
  else:
2633
3391
  cred = credential.Credential(
@@ -2639,18 +3397,18 @@ def doDescribeTopic(args, parsed_globals):
2639
3397
  endpoint=g_param[OptionsDefine.Endpoint],
2640
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
3399
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
3401
  if g_param[OptionsDefine.Language]:
2644
3402
  profile.language = g_param[OptionsDefine.Language]
2645
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2646
3404
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2647
3405
  client._sdkVersion += ("_CLI_" + __version__)
2648
3406
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2649
- model = models.DescribeTopicRequest()
3407
+ model = models.ModifyInstancePreRequest()
2650
3408
  model.from_json_string(json.dumps(args))
2651
3409
  start_time = time.time()
2652
3410
  while True:
2653
- rsp = client.DescribeTopic(model)
3411
+ rsp = client.ModifyInstancePre(model)
2654
3412
  result = rsp.to_json_string()
2655
3413
  try:
2656
3414
  json_obj = json.loads(result)
@@ -2679,7 +3437,10 @@ def doDeleteTopic(args, parsed_globals):
2679
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
3439
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
3445
  else:
2685
3446
  cred = credential.Credential(
@@ -2691,7 +3452,7 @@ def doDeleteTopic(args, parsed_globals):
2691
3452
  endpoint=g_param[OptionsDefine.Endpoint],
2692
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
3454
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
3456
  if g_param[OptionsDefine.Language]:
2696
3457
  profile.language = g_param[OptionsDefine.Language]
2697
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2731,7 +3492,10 @@ def doInquireCkafkaPrice(args, parsed_globals):
2731
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
3494
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
3500
  else:
2737
3501
  cred = credential.Credential(
@@ -2743,7 +3507,7 @@ def doInquireCkafkaPrice(args, parsed_globals):
2743
3507
  endpoint=g_param[OptionsDefine.Endpoint],
2744
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
3509
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
3511
  if g_param[OptionsDefine.Language]:
2748
3512
  profile.language = g_param[OptionsDefine.Language]
2749
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2783,7 +3547,10 @@ def doModifyTopicAttributes(args, parsed_globals):
2783
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
3549
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
3555
  else:
2789
3556
  cred = credential.Credential(
@@ -2795,7 +3562,7 @@ def doModifyTopicAttributes(args, parsed_globals):
2795
3562
  endpoint=g_param[OptionsDefine.Endpoint],
2796
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
3564
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
3566
  if g_param[OptionsDefine.Language]:
2800
3567
  profile.language = g_param[OptionsDefine.Language]
2801
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2840,53 +3607,64 @@ ACTION_MAP = {
2840
3607
  "DescribeGroupInfo": doDescribeGroupInfo,
2841
3608
  "CreateConsumer": doCreateConsumer,
2842
3609
  "CreateAcl": doCreateAcl,
2843
- "CreateInstancePost": doCreateInstancePost,
3610
+ "DescribeTypeInstances": doDescribeTypeInstances,
3611
+ "DescribeDatahubTopics": doDescribeDatahubTopics,
2844
3612
  "DescribeAclRule": doDescribeAclRule,
2845
3613
  "CreateTopic": doCreateTopic,
2846
- "ModifyInstancePre": doModifyInstancePre,
3614
+ "DescribeSecurityGroupRoutes": doDescribeSecurityGroupRoutes,
2847
3615
  "BatchModifyTopicAttributes": doBatchModifyTopicAttributes,
2848
3616
  "DeleteRoute": doDeleteRoute,
2849
3617
  "SendMessage": doSendMessage,
2850
3618
  "DescribeUser": doDescribeUser,
2851
- "CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
2852
3619
  "DescribeGroup": doDescribeGroup,
3620
+ "CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
3621
+ "DescribeCkafkaVersion": doDescribeCkafkaVersion,
2853
3622
  "ModifyGroupOffsets": doModifyGroupOffsets,
3623
+ "UpgradeBrokerVersion": doUpgradeBrokerVersion,
2854
3624
  "DescribeInstances": doDescribeInstances,
2855
- "ModifyInstanceAttributes": doModifyInstanceAttributes,
3625
+ "DescribeCvmInfo": doDescribeCvmInfo,
3626
+ "DescribeDatahubTopic": doDescribeDatahubTopic,
3627
+ "CreateRoute": doCreateRoute,
3628
+ "DeleteGroup": doDeleteGroup,
2856
3629
  "ModifyDatahubTopic": doModifyDatahubTopic,
2857
3630
  "FetchMessageListByOffset": doFetchMessageListByOffset,
2858
3631
  "CreateDatahubTopic": doCreateDatahubTopic,
3632
+ "DeleteInstancePost": doDeleteInstancePost,
2859
3633
  "DescribeACL": doDescribeACL,
2860
- "DescribeDatahubTopics": doDescribeDatahubTopics,
2861
3634
  "DescribeTopicDetail": doDescribeTopicDetail,
3635
+ "CreateInstancePre": doCreateInstancePre,
2862
3636
  "FetchMessageByOffset": doFetchMessageByOffset,
2863
3637
  "DeleteTopicIpWhiteList": doDeleteTopicIpWhiteList,
2864
3638
  "ModifyPassword": doModifyPassword,
2865
3639
  "DescribeConsumerGroup": doDescribeConsumerGroup,
2866
3640
  "DescribeTopicSubscribeGroup": doDescribeTopicSubscribeGroup,
3641
+ "ModifyRoutineMaintenanceTask": doModifyRoutineMaintenanceTask,
2867
3642
  "DeleteRouteTriggerTime": doDeleteRouteTriggerTime,
2868
3643
  "CreatePartition": doCreatePartition,
2869
3644
  "CreateUser": doCreateUser,
2870
3645
  "DescribeTaskStatus": doDescribeTaskStatus,
2871
3646
  "BatchModifyGroupOffsets": doBatchModifyGroupOffsets,
2872
3647
  "DeleteAcl": doDeleteAcl,
2873
- "DescribeAppInfo": doDescribeAppInfo,
3648
+ "InstanceScalingDown": doInstanceScalingDown,
2874
3649
  "DescribeGroupOffsets": doDescribeGroupOffsets,
2875
3650
  "DeleteInstancePre": doDeleteInstancePre,
2876
3651
  "DescribeInstanceAttributes": doDescribeInstanceAttributes,
2877
3652
  "DescribeInstancesDetail": doDescribeInstancesDetail,
2878
3653
  "BatchCreateAcl": doBatchCreateAcl,
3654
+ "DeleteAclRule": doDeleteAclRule,
2879
3655
  "ModifyAclRule": doModifyAclRule,
2880
3656
  "DeleteUser": doDeleteUser,
2881
3657
  "DescribeTopicSyncReplica": doDescribeTopicSyncReplica,
2882
3658
  "DescribeTopicAttributes": doDescribeTopicAttributes,
3659
+ "FetchMessageListByTimestamp": doFetchMessageListByTimestamp,
2883
3660
  "DescribeTopicProduceConnection": doDescribeTopicProduceConnection,
2884
3661
  "CreatePostPaidInstance": doCreatePostPaidInstance,
2885
3662
  "CreateAclRule": doCreateAclRule,
2886
- "DescribeDatahubTopic": doDescribeDatahubTopic,
3663
+ "ModifyInstanceAttributes": doModifyInstanceAttributes,
2887
3664
  "DescribeCkafkaZone": doDescribeCkafkaZone,
2888
3665
  "DescribeRegion": doDescribeRegion,
2889
3666
  "DescribeTopic": doDescribeTopic,
3667
+ "ModifyInstancePre": doModifyInstancePre,
2890
3668
  "DeleteTopic": doDeleteTopic,
2891
3669
  "InquireCkafkaPrice": doInquireCkafkaPrice,
2892
3670
  "ModifyTopicAttributes": doModifyTopicAttributes,