tccli-intl-en 3.0.1168.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/plugins/sso/__init__.py +14 -0
- tccli/plugins/sso/login.py +23 -6
- tccli/plugins/sso/texts.py +4 -0
- tccli/services/__init__.py +49 -2
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +341 -114
- tccli/services/autoscaling/v20180419/api.json +514 -333
- tccli/services/autoscaling/v20180419/examples.json +46 -38
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/__init__.py +4 -0
- tccli/services/bi/bi_client.py +1498 -0
- tccli/services/bi/v20220105/api.json +5769 -0
- tccli/services/bi/v20220105/examples.json +215 -0
- tccli/services/billing/billing_client.py +1055 -134
- tccli/services/billing/v20180709/api.json +1654 -243
- tccli/services/billing/v20180709/examples.json +169 -25
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/captcha/v20190722/api.json +16 -6
- tccli/services/captcha/v20190722/examples.json +3 -3
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +1167 -268
- tccli/services/ccc/v20200210/api.json +2263 -202
- tccli/services/ccc/v20200210/examples.json +116 -12
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdb/v20170320/api.json +426 -173
- tccli/services/cdb/v20170320/examples.json +6 -6
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfg/v20210820/api.json +30 -10
- tccli/services/cfg/v20210820/examples.json +1 -1
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1033 -255
- tccli/services/ckafka/v20190819/api.json +3378 -1681
- tccli/services/ckafka/v20190819/examples.json +254 -160
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2307 -1024
- tccli/services/clb/v20180317/examples.json +186 -126
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +339 -78
- tccli/services/csip/v20221121/api.json +1011 -38
- tccli/services/csip/v20221121/examples.json +24 -0
- tccli/services/ctsdb/__init__.py +4 -0
- tccli/services/ctsdb/ctsdb_client.py +266 -0
- tccli/services/ctsdb/v20230202/api.json +677 -0
- tccli/services/ctsdb/v20230202/examples.json +20 -0
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +1141 -510
- tccli/services/cvm/v20170312/examples.json +174 -128
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +3051 -575
- tccli/services/cynosdb/v20190107/api.json +14074 -7139
- tccli/services/cynosdb/v20190107/examples.json +597 -287
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +390 -111
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +3104 -117
- tccli/services/emr/v20190103/api.json +15311 -4361
- tccli/services/emr/v20190103/examples.json +452 -42
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +172 -45
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +266 -0
- tccli/services/hunyuan/v20230901/api.json +270 -0
- tccli/services/hunyuan/v20230901/examples.json +20 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iai/v20200303/api.json +187 -51
- tccli/services/iai/v20200303/examples.json +30 -12
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/ims/v20201229/api.json +133 -141
- tccli/services/ims/v20201229/examples.json +3 -3
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +516 -72
- tccli/services/intlpartnersmgt/v20220928/api.json +976 -60
- tccli/services/intlpartnersmgt/v20220928/examples.json +50 -2
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/iotcloud/v20210408/api.json +216 -107
- tccli/services/iotcloud/v20210408/examples.json +9 -9
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +1226 -227
- tccli/services/kms/v20190118/api.json +1562 -144
- tccli/services/kms/v20190118/examples.json +204 -78
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +370 -148
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +804 -232
- tccli/services/live/v20180801/api.json +272 -0
- tccli/services/live/v20180801/examples.json +32 -0
- tccli/services/lke/__init__.py +4 -0
- tccli/services/lke/lke_client.py +5194 -0
- tccli/services/lke/v20231130/api.json +14803 -0
- tccli/services/lke/v20231130/examples.json +736 -0
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +953 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +402 -82
- tccli/services/mdl/v20200326/api.json +1144 -58
- tccli/services/mdl/v20200326/examples.json +48 -16
- tccli/services/mdp/mdp_client.py +785 -122
- tccli/services/mdp/v20200527/api.json +1168 -44
- tccli/services/mdp/v20200527/examples.json +151 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1452 -136
- tccli/services/mongodb/v20190725/api.json +4393 -1462
- tccli/services/mongodb/v20190725/examples.json +265 -71
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +660 -11
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1573 -354
- tccli/services/mps/v20190612/api.json +12394 -7243
- tccli/services/mps/v20190612/examples.json +244 -84
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +596 -102
- tccli/services/ocr/v20181119/api.json +2271 -181
- tccli/services/ocr/v20181119/examples.json +70 -8
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +206 -60
- tccli/services/privatedns/v20201028/api.json +179 -0
- tccli/services/privatedns/v20201028/examples.json +8 -0
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +698 -212
- tccli/services/redis/v20180412/api.json +968 -563
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/__init__.py +4 -0
- tccli/services/region/region_client.py +322 -0
- tccli/services/region/v20220627/api.json +399 -0
- tccli/services/region/v20220627/examples.json +29 -0
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +368 -69
- tccli/services/ses/v20201002/api.json +240 -0
- tccli/services/ses/v20201002/examples.json +32 -0
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3855 -470
- tccli/services/sqlserver/v20180328/api.json +9757 -3347
- tccli/services/sqlserver/v20180328/examples.json +480 -20
- tccli/services/ssl/ssl_client.py +504 -72
- tccli/services/ssl/v20191205/api.json +789 -21
- tccli/services/ssl/v20191205/examples.json +54 -0
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/__init__.py +4 -0
- tccli/services/tbaas/tbaas_client.py +378 -0
- tccli/services/tbaas/v20180416/api.json +551 -0
- tccli/services/tbaas/v20180416/examples.json +37 -0
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +4507 -966
- tccli/services/teo/v20220901/api.json +7341 -1405
- tccli/services/teo/v20220901/examples.json +679 -99
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +741 -274
- tccli/services/tke/v20180525/api.json +132 -7
- tccli/services/tke/v20180525/examples.json +42 -16
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tms/v20201229/api.json +91 -100
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/__init__.py +4 -0
- tccli/services/trabbit/trabbit_client.py +1778 -0
- tccli/services/trabbit/v20230418/api.json +4772 -0
- tccli/services/trabbit/v20230418/examples.json +237 -0
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +928 -192
- tccli/services/trtc/v20190722/api.json +1810 -256
- tccli/services/trtc/v20190722/examples.json +100 -6
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/v20210922/api.json +61 -30
- tccli/services/vm/v20210922/examples.json +0 -12
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/v20180717/api.json +332 -52
- tccli/services/vod/v20180717/examples.json +9 -1
- tccli/services/vod/v20240718/api.json +1105 -0
- tccli/services/vod/v20240718/examples.json +97 -0
- tccli/services/vod/vod_client.py +1316 -350
- tccli/services/vpc/v20170312/api.json +1166 -106
- tccli/services/vpc/v20170312/examples.json +197 -23
- tccli/services/vpc/vpc_client.py +2413 -739
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20210820/api.json +1577 -231
- tccli/services/wedata/v20210820/examples.json +74 -12
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6366 -1191
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +294 -230
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
tccli/services/clb/clb_client.py
CHANGED
|
@@ -17,7 +17,7 @@ from tencentcloud.clb.v20180317 import models as models_v20180317
|
|
|
17
17
|
from jmespath import search
|
|
18
18
|
import time
|
|
19
19
|
|
|
20
|
-
def
|
|
20
|
+
def doDescribeCustomizedConfigAssociateList(args, parsed_globals):
|
|
21
21
|
g_param = parse_global_arg(parsed_globals)
|
|
22
22
|
|
|
23
23
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -27,7 +27,10 @@ def doRegisterTargets(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,18 +42,18 @@ def doRegisterTargets(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
46
49
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
47
50
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
48
51
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
49
|
-
model = models.
|
|
52
|
+
model = models.DescribeCustomizedConfigAssociateListRequest()
|
|
50
53
|
model.from_json_string(json.dumps(args))
|
|
51
54
|
start_time = time.time()
|
|
52
55
|
while True:
|
|
53
|
-
rsp = client.
|
|
56
|
+
rsp = client.DescribeCustomizedConfigAssociateList(model)
|
|
54
57
|
result = rsp.to_json_string()
|
|
55
58
|
try:
|
|
56
59
|
json_obj = json.loads(result)
|
|
@@ -69,7 +72,7 @@ def doRegisterTargets(args, parsed_globals):
|
|
|
69
72
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
70
73
|
|
|
71
74
|
|
|
72
|
-
def
|
|
75
|
+
def doInquiryPriceModifyLoadBalancer(args, parsed_globals):
|
|
73
76
|
g_param = parse_global_arg(parsed_globals)
|
|
74
77
|
|
|
75
78
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -79,7 +82,10 @@ def doDescribeResources(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,18 +97,18 @@ def doDescribeResources(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
98
104
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
99
105
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
100
106
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
101
|
-
model = models.
|
|
107
|
+
model = models.InquiryPriceModifyLoadBalancerRequest()
|
|
102
108
|
model.from_json_string(json.dumps(args))
|
|
103
109
|
start_time = time.time()
|
|
104
110
|
while True:
|
|
105
|
-
rsp = client.
|
|
111
|
+
rsp = client.InquiryPriceModifyLoadBalancer(model)
|
|
106
112
|
result = rsp.to_json_string()
|
|
107
113
|
try:
|
|
108
114
|
json_obj = json.loads(result)
|
|
@@ -121,7 +127,7 @@ def doDescribeResources(args, parsed_globals):
|
|
|
121
127
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
122
128
|
|
|
123
129
|
|
|
124
|
-
def
|
|
130
|
+
def doBatchDeregisterTargets(args, parsed_globals):
|
|
125
131
|
g_param = parse_global_arg(parsed_globals)
|
|
126
132
|
|
|
127
133
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -131,7 +137,10 @@ def doModifyFunctionTargets(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,18 +152,18 @@ def doModifyFunctionTargets(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
150
159
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
151
160
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
152
161
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
153
|
-
model = models.
|
|
162
|
+
model = models.BatchDeregisterTargetsRequest()
|
|
154
163
|
model.from_json_string(json.dumps(args))
|
|
155
164
|
start_time = time.time()
|
|
156
165
|
while True:
|
|
157
|
-
rsp = client.
|
|
166
|
+
rsp = client.BatchDeregisterTargets(model)
|
|
158
167
|
result = rsp.to_json_string()
|
|
159
168
|
try:
|
|
160
169
|
json_obj = json.loads(result)
|
|
@@ -173,7 +182,7 @@ def doModifyFunctionTargets(args, parsed_globals):
|
|
|
173
182
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
174
183
|
|
|
175
184
|
|
|
176
|
-
def
|
|
185
|
+
def doAutoRewrite(args, parsed_globals):
|
|
177
186
|
g_param = parse_global_arg(parsed_globals)
|
|
178
187
|
|
|
179
188
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -183,7 +192,10 @@ def doDescribeClassicalLBListeners(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,18 +207,18 @@ def doDescribeClassicalLBListeners(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
202
214
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
203
215
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
204
216
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
205
|
-
model = models.
|
|
217
|
+
model = models.AutoRewriteRequest()
|
|
206
218
|
model.from_json_string(json.dumps(args))
|
|
207
219
|
start_time = time.time()
|
|
208
220
|
while True:
|
|
209
|
-
rsp = client.
|
|
221
|
+
rsp = client.AutoRewrite(model)
|
|
210
222
|
result = rsp.to_json_string()
|
|
211
223
|
try:
|
|
212
224
|
json_obj = json.loads(result)
|
|
@@ -225,7 +237,7 @@ def doDescribeClassicalLBListeners(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
228
|
-
def
|
|
240
|
+
def doModifyTargetGroupInstancesWeight(args, parsed_globals):
|
|
229
241
|
g_param = parse_global_arg(parsed_globals)
|
|
230
242
|
|
|
231
243
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -235,7 +247,10 @@ def doInquiryPriceRefundLoadBalancer(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,18 +262,18 @@ def doInquiryPriceRefundLoadBalancer(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
254
269
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
270
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
271
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
272
|
+
model = models.ModifyTargetGroupInstancesWeightRequest()
|
|
258
273
|
model.from_json_string(json.dumps(args))
|
|
259
274
|
start_time = time.time()
|
|
260
275
|
while True:
|
|
261
|
-
rsp = client.
|
|
276
|
+
rsp = client.ModifyTargetGroupInstancesWeight(model)
|
|
262
277
|
result = rsp.to_json_string()
|
|
263
278
|
try:
|
|
264
279
|
json_obj = json.loads(result)
|
|
@@ -277,7 +292,7 @@ def doInquiryPriceRefundLoadBalancer(args, parsed_globals):
|
|
|
277
292
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
278
293
|
|
|
279
294
|
|
|
280
|
-
def
|
|
295
|
+
def doAssociateCustomizedConfig(args, parsed_globals):
|
|
281
296
|
g_param = parse_global_arg(parsed_globals)
|
|
282
297
|
|
|
283
298
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -287,7 +302,10 @@ def doDescribeCustomizedConfigAssociateList(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,18 +317,18 @@ def doDescribeCustomizedConfigAssociateList(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
306
324
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
325
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
326
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
-
model = models.
|
|
327
|
+
model = models.AssociateCustomizedConfigRequest()
|
|
310
328
|
model.from_json_string(json.dumps(args))
|
|
311
329
|
start_time = time.time()
|
|
312
330
|
while True:
|
|
313
|
-
rsp = client.
|
|
331
|
+
rsp = client.AssociateCustomizedConfig(model)
|
|
314
332
|
result = rsp.to_json_string()
|
|
315
333
|
try:
|
|
316
334
|
json_obj = json.loads(result)
|
|
@@ -329,7 +347,7 @@ def doDescribeCustomizedConfigAssociateList(args, parsed_globals):
|
|
|
329
347
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
348
|
|
|
331
349
|
|
|
332
|
-
def
|
|
350
|
+
def doDeregisterTargetsFromClassicalLB(args, parsed_globals):
|
|
333
351
|
g_param = parse_global_arg(parsed_globals)
|
|
334
352
|
|
|
335
353
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -339,7 +357,10 @@ def doDescribeBlockIPTask(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,18 +372,18 @@ def doDescribeBlockIPTask(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
379
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
380
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
381
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
-
model = models.
|
|
382
|
+
model = models.DeregisterTargetsFromClassicalLBRequest()
|
|
362
383
|
model.from_json_string(json.dumps(args))
|
|
363
384
|
start_time = time.time()
|
|
364
385
|
while True:
|
|
365
|
-
rsp = client.
|
|
386
|
+
rsp = client.DeregisterTargetsFromClassicalLB(model)
|
|
366
387
|
result = rsp.to_json_string()
|
|
367
388
|
try:
|
|
368
389
|
json_obj = json.loads(result)
|
|
@@ -381,7 +402,7 @@ def doDescribeBlockIPTask(args, parsed_globals):
|
|
|
381
402
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
403
|
|
|
383
404
|
|
|
384
|
-
def
|
|
405
|
+
def doDescribeLoadBalancersDetail(args, parsed_globals):
|
|
385
406
|
g_param = parse_global_arg(parsed_globals)
|
|
386
407
|
|
|
387
408
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -391,7 +412,10 @@ def doCreateListener(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,18 +427,18 @@ def doCreateListener(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
410
434
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
435
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
436
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
-
model = models.
|
|
437
|
+
model = models.DescribeLoadBalancersDetailRequest()
|
|
414
438
|
model.from_json_string(json.dumps(args))
|
|
415
439
|
start_time = time.time()
|
|
416
440
|
while True:
|
|
417
|
-
rsp = client.
|
|
441
|
+
rsp = client.DescribeLoadBalancersDetail(model)
|
|
418
442
|
result = rsp.to_json_string()
|
|
419
443
|
try:
|
|
420
444
|
json_obj = json.loads(result)
|
|
@@ -433,7 +457,7 @@ def doCreateListener(args, parsed_globals):
|
|
|
433
457
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
434
458
|
|
|
435
459
|
|
|
436
|
-
def
|
|
460
|
+
def doAssociateTargetGroups(args, parsed_globals):
|
|
437
461
|
g_param = parse_global_arg(parsed_globals)
|
|
438
462
|
|
|
439
463
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -443,7 +467,10 @@ def doDeleteLoadBalancerSnatIps(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,18 +482,18 @@ def doDeleteLoadBalancerSnatIps(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
462
489
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
463
490
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
464
491
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
465
|
-
model = models.
|
|
492
|
+
model = models.AssociateTargetGroupsRequest()
|
|
466
493
|
model.from_json_string(json.dumps(args))
|
|
467
494
|
start_time = time.time()
|
|
468
495
|
while True:
|
|
469
|
-
rsp = client.
|
|
496
|
+
rsp = client.AssociateTargetGroups(model)
|
|
470
497
|
result = rsp.to_json_string()
|
|
471
498
|
try:
|
|
472
499
|
json_obj = json.loads(result)
|
|
@@ -485,7 +512,7 @@ def doDeleteLoadBalancerSnatIps(args, parsed_globals):
|
|
|
485
512
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
513
|
|
|
487
514
|
|
|
488
|
-
def
|
|
515
|
+
def doDeregisterTargetGroupInstances(args, parsed_globals):
|
|
489
516
|
g_param = parse_global_arg(parsed_globals)
|
|
490
517
|
|
|
491
518
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -495,7 +522,10 @@ def doDeleteListener(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,18 +537,18 @@ def doDeleteListener(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
544
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
545
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
546
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
547
|
+
model = models.DeregisterTargetGroupInstancesRequest()
|
|
518
548
|
model.from_json_string(json.dumps(args))
|
|
519
549
|
start_time = time.time()
|
|
520
550
|
while True:
|
|
521
|
-
rsp = client.
|
|
551
|
+
rsp = client.DeregisterTargetGroupInstances(model)
|
|
522
552
|
result = rsp.to_json_string()
|
|
523
553
|
try:
|
|
524
554
|
json_obj = json.loads(result)
|
|
@@ -537,7 +567,7 @@ def doDeleteListener(args, parsed_globals):
|
|
|
537
567
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
568
|
|
|
539
569
|
|
|
540
|
-
def
|
|
570
|
+
def doDescribeListeners(args, parsed_globals):
|
|
541
571
|
g_param = parse_global_arg(parsed_globals)
|
|
542
572
|
|
|
543
573
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -547,7 +577,10 @@ def doInquiryPriceModifyLoadBalancer(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,18 +592,18 @@ def doInquiryPriceModifyLoadBalancer(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
566
599
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
600
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
601
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
602
|
+
model = models.DescribeListenersRequest()
|
|
570
603
|
model.from_json_string(json.dumps(args))
|
|
571
604
|
start_time = time.time()
|
|
572
605
|
while True:
|
|
573
|
-
rsp = client.
|
|
606
|
+
rsp = client.DescribeListeners(model)
|
|
574
607
|
result = rsp.to_json_string()
|
|
575
608
|
try:
|
|
576
609
|
json_obj = json.loads(result)
|
|
@@ -589,7 +622,7 @@ def doInquiryPriceModifyLoadBalancer(args, parsed_globals):
|
|
|
589
622
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
623
|
|
|
591
624
|
|
|
592
|
-
def
|
|
625
|
+
def doCreateTopic(args, parsed_globals):
|
|
593
626
|
g_param = parse_global_arg(parsed_globals)
|
|
594
627
|
|
|
595
628
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -599,7 +632,10 @@ def doSetSecurityGroupForLoadbalancers(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,18 +647,18 @@ def doSetSecurityGroupForLoadbalancers(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
618
654
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
655
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
656
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
657
|
+
model = models.CreateTopicRequest()
|
|
622
658
|
model.from_json_string(json.dumps(args))
|
|
623
659
|
start_time = time.time()
|
|
624
660
|
while True:
|
|
625
|
-
rsp = client.
|
|
661
|
+
rsp = client.CreateTopic(model)
|
|
626
662
|
result = rsp.to_json_string()
|
|
627
663
|
try:
|
|
628
664
|
json_obj = json.loads(result)
|
|
@@ -641,7 +677,7 @@ def doSetSecurityGroupForLoadbalancers(args, parsed_globals):
|
|
|
641
677
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
678
|
|
|
643
679
|
|
|
644
|
-
def
|
|
680
|
+
def doModifyLoadBalancersProject(args, parsed_globals):
|
|
645
681
|
g_param = parse_global_arg(parsed_globals)
|
|
646
682
|
|
|
647
683
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -651,7 +687,10 @@ def doBatchDeregisterTargets(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,18 +702,18 @@ def doBatchDeregisterTargets(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
670
709
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
671
710
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
672
711
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
673
|
-
model = models.
|
|
712
|
+
model = models.ModifyLoadBalancersProjectRequest()
|
|
674
713
|
model.from_json_string(json.dumps(args))
|
|
675
714
|
start_time = time.time()
|
|
676
715
|
while True:
|
|
677
|
-
rsp = client.
|
|
716
|
+
rsp = client.ModifyLoadBalancersProject(model)
|
|
678
717
|
result = rsp.to_json_string()
|
|
679
718
|
try:
|
|
680
719
|
json_obj = json.loads(result)
|
|
@@ -693,7 +732,7 @@ def doBatchDeregisterTargets(args, parsed_globals):
|
|
|
693
732
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
733
|
|
|
695
734
|
|
|
696
|
-
def
|
|
735
|
+
def doSetCustomizedConfigForLoadBalancer(args, parsed_globals):
|
|
697
736
|
g_param = parse_global_arg(parsed_globals)
|
|
698
737
|
|
|
699
738
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -703,7 +742,10 @@ def doRegisterTargetGroupInstances(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,18 +757,18 @@ def doRegisterTargetGroupInstances(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
722
764
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
765
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
766
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
767
|
+
model = models.SetCustomizedConfigForLoadBalancerRequest()
|
|
726
768
|
model.from_json_string(json.dumps(args))
|
|
727
769
|
start_time = time.time()
|
|
728
770
|
while True:
|
|
729
|
-
rsp = client.
|
|
771
|
+
rsp = client.SetCustomizedConfigForLoadBalancer(model)
|
|
730
772
|
result = rsp.to_json_string()
|
|
731
773
|
try:
|
|
732
774
|
json_obj = json.loads(result)
|
|
@@ -745,7 +787,7 @@ def doRegisterTargetGroupInstances(args, parsed_globals):
|
|
|
745
787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
788
|
|
|
747
789
|
|
|
748
|
-
def
|
|
790
|
+
def doRegisterTargetsWithClassicalLB(args, parsed_globals):
|
|
749
791
|
g_param = parse_global_arg(parsed_globals)
|
|
750
792
|
|
|
751
793
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -755,7 +797,10 @@ def doCreateRule(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,18 +812,18 @@ def doCreateRule(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
774
819
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
820
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
821
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
822
|
+
model = models.RegisterTargetsWithClassicalLBRequest()
|
|
778
823
|
model.from_json_string(json.dumps(args))
|
|
779
824
|
start_time = time.time()
|
|
780
825
|
while True:
|
|
781
|
-
rsp = client.
|
|
826
|
+
rsp = client.RegisterTargetsWithClassicalLB(model)
|
|
782
827
|
result = rsp.to_json_string()
|
|
783
828
|
try:
|
|
784
829
|
json_obj = json.loads(result)
|
|
@@ -797,7 +842,7 @@ def doCreateRule(args, parsed_globals):
|
|
|
797
842
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
843
|
|
|
799
844
|
|
|
800
|
-
def
|
|
845
|
+
def doDeregisterTargets(args, parsed_globals):
|
|
801
846
|
g_param = parse_global_arg(parsed_globals)
|
|
802
847
|
|
|
803
848
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -807,7 +852,10 @@ def doDescribeClassicalLBHealthStatus(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,18 +867,18 @@ def doDescribeClassicalLBHealthStatus(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
826
874
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
875
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
876
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
877
|
+
model = models.DeregisterTargetsRequest()
|
|
830
878
|
model.from_json_string(json.dumps(args))
|
|
831
879
|
start_time = time.time()
|
|
832
880
|
while True:
|
|
833
|
-
rsp = client.
|
|
881
|
+
rsp = client.DeregisterTargets(model)
|
|
834
882
|
result = rsp.to_json_string()
|
|
835
883
|
try:
|
|
836
884
|
json_obj = json.loads(result)
|
|
@@ -849,7 +897,7 @@ def doDescribeClassicalLBHealthStatus(args, parsed_globals):
|
|
|
849
897
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
898
|
|
|
851
899
|
|
|
852
|
-
def
|
|
900
|
+
def doModifyLoadBalancerAttributes(args, parsed_globals):
|
|
853
901
|
g_param = parse_global_arg(parsed_globals)
|
|
854
902
|
|
|
855
903
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +907,10 @@ def doAutoRewrite(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,18 +922,18 @@ def doAutoRewrite(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
878
929
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
930
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
931
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
932
|
+
model = models.ModifyLoadBalancerAttributesRequest()
|
|
882
933
|
model.from_json_string(json.dumps(args))
|
|
883
934
|
start_time = time.time()
|
|
884
935
|
while True:
|
|
885
|
-
rsp = client.
|
|
936
|
+
rsp = client.ModifyLoadBalancerAttributes(model)
|
|
886
937
|
result = rsp.to_json_string()
|
|
887
938
|
try:
|
|
888
939
|
json_obj = json.loads(result)
|
|
@@ -901,7 +952,7 @@ def doAutoRewrite(args, parsed_globals):
|
|
|
901
952
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
953
|
|
|
903
954
|
|
|
904
|
-
def
|
|
955
|
+
def doModifyTargetGroupInstancesPort(args, parsed_globals):
|
|
905
956
|
g_param = parse_global_arg(parsed_globals)
|
|
906
957
|
|
|
907
958
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -911,7 +962,10 @@ def doDescribeLoadBalancerTraffic(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,18 +977,18 @@ def doDescribeLoadBalancerTraffic(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
930
984
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
985
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
986
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
987
|
+
model = models.ModifyTargetGroupInstancesPortRequest()
|
|
934
988
|
model.from_json_string(json.dumps(args))
|
|
935
989
|
start_time = time.time()
|
|
936
990
|
while True:
|
|
937
|
-
rsp = client.
|
|
991
|
+
rsp = client.ModifyTargetGroupInstancesPort(model)
|
|
938
992
|
result = rsp.to_json_string()
|
|
939
993
|
try:
|
|
940
994
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1007,7 @@ def doDescribeLoadBalancerTraffic(args, parsed_globals):
|
|
|
953
1007
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1008
|
|
|
955
1009
|
|
|
956
|
-
def
|
|
1010
|
+
def doBatchModifyTargetWeight(args, parsed_globals):
|
|
957
1011
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1012
|
|
|
959
1013
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -963,7 +1017,10 @@ def doModifyDomain(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,18 +1032,18 @@ def doModifyDomain(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
982
1039
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1040
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1041
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1042
|
+
model = models.BatchModifyTargetWeightRequest()
|
|
986
1043
|
model.from_json_string(json.dumps(args))
|
|
987
1044
|
start_time = time.time()
|
|
988
1045
|
while True:
|
|
989
|
-
rsp = client.
|
|
1046
|
+
rsp = client.BatchModifyTargetWeight(model)
|
|
990
1047
|
result = rsp.to_json_string()
|
|
991
1048
|
try:
|
|
992
1049
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1062,7 @@ def doModifyDomain(args, parsed_globals):
|
|
|
1005
1062
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1063
|
|
|
1007
1064
|
|
|
1008
|
-
def
|
|
1065
|
+
def doDeleteRewrite(args, parsed_globals):
|
|
1009
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1067
|
|
|
1011
1068
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1015,7 +1072,10 @@ def doDeleteLoadBalancerListeners(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,18 +1087,18 @@ def doDeleteLoadBalancerListeners(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1034
1094
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1095
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1097
|
+
model = models.DeleteRewriteRequest()
|
|
1038
1098
|
model.from_json_string(json.dumps(args))
|
|
1039
1099
|
start_time = time.time()
|
|
1040
1100
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1101
|
+
rsp = client.DeleteRewrite(model)
|
|
1042
1102
|
result = rsp.to_json_string()
|
|
1043
1103
|
try:
|
|
1044
1104
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1117,7 @@ def doDeleteLoadBalancerListeners(args, parsed_globals):
|
|
|
1057
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1118
|
|
|
1059
1119
|
|
|
1060
|
-
def
|
|
1120
|
+
def doDisassociateCustomizedConfig(args, parsed_globals):
|
|
1061
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1122
|
|
|
1063
1123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1127,10 @@ def doInquiryPriceRenewLoadBalancer(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,18 +1142,18 @@ def doInquiryPriceRenewLoadBalancer(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1086
1149
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1150
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1151
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1152
|
+
model = models.DisassociateCustomizedConfigRequest()
|
|
1090
1153
|
model.from_json_string(json.dumps(args))
|
|
1091
1154
|
start_time = time.time()
|
|
1092
1155
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1156
|
+
rsp = client.DisassociateCustomizedConfig(model)
|
|
1094
1157
|
result = rsp.to_json_string()
|
|
1095
1158
|
try:
|
|
1096
1159
|
json_obj = json.loads(result)
|
|
@@ -1119,7 +1182,10 @@ def doSetLoadBalancerSecurityGroups(args, parsed_globals):
|
|
|
1119
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1184
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1190
|
else:
|
|
1125
1191
|
cred = credential.Credential(
|
|
@@ -1131,7 +1197,7 @@ def doSetLoadBalancerSecurityGroups(args, parsed_globals):
|
|
|
1131
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1199
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1201
|
if g_param[OptionsDefine.Language]:
|
|
1136
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1161,7 +1227,7 @@ def doSetLoadBalancerSecurityGroups(args, parsed_globals):
|
|
|
1161
1227
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1162
1228
|
|
|
1163
1229
|
|
|
1164
|
-
def
|
|
1230
|
+
def doInquiryPriceRefundLoadBalancer(args, parsed_globals):
|
|
1165
1231
|
g_param = parse_global_arg(parsed_globals)
|
|
1166
1232
|
|
|
1167
1233
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1171,7 +1237,10 @@ def doDeleteTargetGroups(args, parsed_globals):
|
|
|
1171
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1239
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1245
|
else:
|
|
1177
1246
|
cred = credential.Credential(
|
|
@@ -1183,18 +1252,18 @@ def doDeleteTargetGroups(args, parsed_globals):
|
|
|
1183
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1254
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1256
|
if g_param[OptionsDefine.Language]:
|
|
1188
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1190
1259
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1191
1260
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1192
1261
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1193
|
-
model = models.
|
|
1262
|
+
model = models.InquiryPriceRefundLoadBalancerRequest()
|
|
1194
1263
|
model.from_json_string(json.dumps(args))
|
|
1195
1264
|
start_time = time.time()
|
|
1196
1265
|
while True:
|
|
1197
|
-
rsp = client.
|
|
1266
|
+
rsp = client.InquiryPriceRefundLoadBalancer(model)
|
|
1198
1267
|
result = rsp.to_json_string()
|
|
1199
1268
|
try:
|
|
1200
1269
|
json_obj = json.loads(result)
|
|
@@ -1213,7 +1282,7 @@ def doDeleteTargetGroups(args, parsed_globals):
|
|
|
1213
1282
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1214
1283
|
|
|
1215
1284
|
|
|
1216
|
-
def
|
|
1285
|
+
def doDeleteListener(args, parsed_globals):
|
|
1217
1286
|
g_param = parse_global_arg(parsed_globals)
|
|
1218
1287
|
|
|
1219
1288
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1223,7 +1292,10 @@ def doSetLoadBalancerStartStatus(args, parsed_globals):
|
|
|
1223
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1294
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1300
|
else:
|
|
1229
1301
|
cred = credential.Credential(
|
|
@@ -1235,18 +1307,18 @@ def doSetLoadBalancerStartStatus(args, parsed_globals):
|
|
|
1235
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1309
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1311
|
if g_param[OptionsDefine.Language]:
|
|
1240
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1242
1314
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1243
1315
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1244
1316
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1245
|
-
model = models.
|
|
1317
|
+
model = models.DeleteListenerRequest()
|
|
1246
1318
|
model.from_json_string(json.dumps(args))
|
|
1247
1319
|
start_time = time.time()
|
|
1248
1320
|
while True:
|
|
1249
|
-
rsp = client.
|
|
1321
|
+
rsp = client.DeleteListener(model)
|
|
1250
1322
|
result = rsp.to_json_string()
|
|
1251
1323
|
try:
|
|
1252
1324
|
json_obj = json.loads(result)
|
|
@@ -1265,7 +1337,7 @@ def doSetLoadBalancerStartStatus(args, parsed_globals):
|
|
|
1265
1337
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1338
|
|
|
1267
1339
|
|
|
1268
|
-
def
|
|
1340
|
+
def doSetSecurityGroupForLoadbalancers(args, parsed_globals):
|
|
1269
1341
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1342
|
|
|
1271
1343
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1275,7 +1347,10 @@ def doDeregisterTargetsFromClassicalLB(args, parsed_globals):
|
|
|
1275
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1349
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1355
|
else:
|
|
1281
1356
|
cred = credential.Credential(
|
|
@@ -1287,18 +1362,18 @@ def doDeregisterTargetsFromClassicalLB(args, parsed_globals):
|
|
|
1287
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1364
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1366
|
if g_param[OptionsDefine.Language]:
|
|
1292
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1294
1369
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1295
1370
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1296
1371
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1297
|
-
model = models.
|
|
1372
|
+
model = models.SetSecurityGroupForLoadbalancersRequest()
|
|
1298
1373
|
model.from_json_string(json.dumps(args))
|
|
1299
1374
|
start_time = time.time()
|
|
1300
1375
|
while True:
|
|
1301
|
-
rsp = client.
|
|
1376
|
+
rsp = client.SetSecurityGroupForLoadbalancers(model)
|
|
1302
1377
|
result = rsp.to_json_string()
|
|
1303
1378
|
try:
|
|
1304
1379
|
json_obj = json.loads(result)
|
|
@@ -1317,7 +1392,7 @@ def doDeregisterTargetsFromClassicalLB(args, parsed_globals):
|
|
|
1317
1392
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1318
1393
|
|
|
1319
1394
|
|
|
1320
|
-
def
|
|
1395
|
+
def doRegisterTargetGroupInstances(args, parsed_globals):
|
|
1321
1396
|
g_param = parse_global_arg(parsed_globals)
|
|
1322
1397
|
|
|
1323
1398
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1327,7 +1402,10 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
1327
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1404
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1410
|
else:
|
|
1333
1411
|
cred = credential.Credential(
|
|
@@ -1339,18 +1417,18 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
1339
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1419
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1421
|
if g_param[OptionsDefine.Language]:
|
|
1344
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1346
1424
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1347
1425
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1348
1426
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1349
|
-
model = models.
|
|
1427
|
+
model = models.RegisterTargetGroupInstancesRequest()
|
|
1350
1428
|
model.from_json_string(json.dumps(args))
|
|
1351
1429
|
start_time = time.time()
|
|
1352
1430
|
while True:
|
|
1353
|
-
rsp = client.
|
|
1431
|
+
rsp = client.RegisterTargetGroupInstances(model)
|
|
1354
1432
|
result = rsp.to_json_string()
|
|
1355
1433
|
try:
|
|
1356
1434
|
json_obj = json.loads(result)
|
|
@@ -1369,7 +1447,7 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
1369
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1370
1448
|
|
|
1371
1449
|
|
|
1372
|
-
def
|
|
1450
|
+
def doSetLoadBalancerStartStatus(args, parsed_globals):
|
|
1373
1451
|
g_param = parse_global_arg(parsed_globals)
|
|
1374
1452
|
|
|
1375
1453
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1379,7 +1457,10 @@ def doDescribeLoadBalancerListByCertId(args, parsed_globals):
|
|
|
1379
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1459
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1465
|
else:
|
|
1385
1466
|
cred = credential.Credential(
|
|
@@ -1391,18 +1472,18 @@ def doDescribeLoadBalancerListByCertId(args, parsed_globals):
|
|
|
1391
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1474
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1476
|
if g_param[OptionsDefine.Language]:
|
|
1396
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1398
1479
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1399
1480
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1400
1481
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1401
|
-
model = models.
|
|
1482
|
+
model = models.SetLoadBalancerStartStatusRequest()
|
|
1402
1483
|
model.from_json_string(json.dumps(args))
|
|
1403
1484
|
start_time = time.time()
|
|
1404
1485
|
while True:
|
|
1405
|
-
rsp = client.
|
|
1486
|
+
rsp = client.SetLoadBalancerStartStatus(model)
|
|
1406
1487
|
result = rsp.to_json_string()
|
|
1407
1488
|
try:
|
|
1408
1489
|
json_obj = json.loads(result)
|
|
@@ -1431,7 +1512,10 @@ def doModifyListener(args, parsed_globals):
|
|
|
1431
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1514
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1520
|
else:
|
|
1437
1521
|
cred = credential.Credential(
|
|
@@ -1443,7 +1527,7 @@ def doModifyListener(args, parsed_globals):
|
|
|
1443
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1529
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1531
|
if g_param[OptionsDefine.Language]:
|
|
1448
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1473,7 +1557,7 @@ def doModifyListener(args, parsed_globals):
|
|
|
1473
1557
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1474
1558
|
|
|
1475
1559
|
|
|
1476
|
-
def
|
|
1560
|
+
def doDeleteCustomizedConfig(args, parsed_globals):
|
|
1477
1561
|
g_param = parse_global_arg(parsed_globals)
|
|
1478
1562
|
|
|
1479
1563
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1483,7 +1567,10 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
|
1483
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1569
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1575
|
else:
|
|
1489
1576
|
cred = credential.Credential(
|
|
@@ -1495,18 +1582,18 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
|
1495
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1584
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1586
|
if g_param[OptionsDefine.Language]:
|
|
1500
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1502
1589
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1503
1590
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1504
1591
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1505
|
-
model = models.
|
|
1592
|
+
model = models.DeleteCustomizedConfigRequest()
|
|
1506
1593
|
model.from_json_string(json.dumps(args))
|
|
1507
1594
|
start_time = time.time()
|
|
1508
1595
|
while True:
|
|
1509
|
-
rsp = client.
|
|
1596
|
+
rsp = client.DeleteCustomizedConfig(model)
|
|
1510
1597
|
result = rsp.to_json_string()
|
|
1511
1598
|
try:
|
|
1512
1599
|
json_obj = json.loads(result)
|
|
@@ -1525,7 +1612,7 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
|
1525
1612
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1526
1613
|
|
|
1527
1614
|
|
|
1528
|
-
def
|
|
1615
|
+
def doDescribeResources(args, parsed_globals):
|
|
1529
1616
|
g_param = parse_global_arg(parsed_globals)
|
|
1530
1617
|
|
|
1531
1618
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1535,7 +1622,10 @@ def doInquiryPriceCreateLoadBalancer(args, parsed_globals):
|
|
|
1535
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1624
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1630
|
else:
|
|
1541
1631
|
cred = credential.Credential(
|
|
@@ -1547,18 +1637,18 @@ def doInquiryPriceCreateLoadBalancer(args, parsed_globals):
|
|
|
1547
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1639
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1641
|
if g_param[OptionsDefine.Language]:
|
|
1552
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1554
1644
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1555
1645
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1556
1646
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1557
|
-
model = models.
|
|
1647
|
+
model = models.DescribeResourcesRequest()
|
|
1558
1648
|
model.from_json_string(json.dumps(args))
|
|
1559
1649
|
start_time = time.time()
|
|
1560
1650
|
while True:
|
|
1561
|
-
rsp = client.
|
|
1651
|
+
rsp = client.DescribeResources(model)
|
|
1562
1652
|
result = rsp.to_json_string()
|
|
1563
1653
|
try:
|
|
1564
1654
|
json_obj = json.loads(result)
|
|
@@ -1577,7 +1667,7 @@ def doInquiryPriceCreateLoadBalancer(args, parsed_globals):
|
|
|
1577
1667
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
1668
|
|
|
1579
1669
|
|
|
1580
|
-
def
|
|
1670
|
+
def doDescribeLBListeners(args, parsed_globals):
|
|
1581
1671
|
g_param = parse_global_arg(parsed_globals)
|
|
1582
1672
|
|
|
1583
1673
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1587,7 +1677,10 @@ def doModifyDomainAttributes(args, parsed_globals):
|
|
|
1587
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1679
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1685
|
else:
|
|
1593
1686
|
cred = credential.Credential(
|
|
@@ -1599,18 +1692,18 @@ def doModifyDomainAttributes(args, parsed_globals):
|
|
|
1599
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1694
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1696
|
if g_param[OptionsDefine.Language]:
|
|
1604
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1606
1699
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1607
1700
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1608
1701
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1609
|
-
model = models.
|
|
1702
|
+
model = models.DescribeLBListenersRequest()
|
|
1610
1703
|
model.from_json_string(json.dumps(args))
|
|
1611
1704
|
start_time = time.time()
|
|
1612
1705
|
while True:
|
|
1613
|
-
rsp = client.
|
|
1706
|
+
rsp = client.DescribeLBListeners(model)
|
|
1614
1707
|
result = rsp.to_json_string()
|
|
1615
1708
|
try:
|
|
1616
1709
|
json_obj = json.loads(result)
|
|
@@ -1629,7 +1722,7 @@ def doModifyDomainAttributes(args, parsed_globals):
|
|
|
1629
1722
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1630
1723
|
|
|
1631
1724
|
|
|
1632
|
-
def
|
|
1725
|
+
def doBatchRegisterTargets(args, parsed_globals):
|
|
1633
1726
|
g_param = parse_global_arg(parsed_globals)
|
|
1634
1727
|
|
|
1635
1728
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1639,7 +1732,10 @@ def doDisassociateTargetGroups(args, parsed_globals):
|
|
|
1639
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1734
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1740
|
else:
|
|
1645
1741
|
cred = credential.Credential(
|
|
@@ -1651,18 +1747,18 @@ def doDisassociateTargetGroups(args, parsed_globals):
|
|
|
1651
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1749
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1751
|
if g_param[OptionsDefine.Language]:
|
|
1656
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1658
1754
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1659
1755
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1660
1756
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1661
|
-
model = models.
|
|
1757
|
+
model = models.BatchRegisterTargetsRequest()
|
|
1662
1758
|
model.from_json_string(json.dumps(args))
|
|
1663
1759
|
start_time = time.time()
|
|
1664
1760
|
while True:
|
|
1665
|
-
rsp = client.
|
|
1761
|
+
rsp = client.BatchRegisterTargets(model)
|
|
1666
1762
|
result = rsp.to_json_string()
|
|
1667
1763
|
try:
|
|
1668
1764
|
json_obj = json.loads(result)
|
|
@@ -1681,7 +1777,7 @@ def doDisassociateTargetGroups(args, parsed_globals):
|
|
|
1681
1777
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1682
1778
|
|
|
1683
1779
|
|
|
1684
|
-
def
|
|
1780
|
+
def doRegisterFunctionTargets(args, parsed_globals):
|
|
1685
1781
|
g_param = parse_global_arg(parsed_globals)
|
|
1686
1782
|
|
|
1687
1783
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1691,7 +1787,10 @@ def doCreateTargetGroup(args, parsed_globals):
|
|
|
1691
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1789
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1795
|
else:
|
|
1697
1796
|
cred = credential.Credential(
|
|
@@ -1703,18 +1802,18 @@ def doCreateTargetGroup(args, parsed_globals):
|
|
|
1703
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1804
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1806
|
if g_param[OptionsDefine.Language]:
|
|
1708
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1710
1809
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1711
1810
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1712
1811
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1713
|
-
model = models.
|
|
1812
|
+
model = models.RegisterFunctionTargetsRequest()
|
|
1714
1813
|
model.from_json_string(json.dumps(args))
|
|
1715
1814
|
start_time = time.time()
|
|
1716
1815
|
while True:
|
|
1717
|
-
rsp = client.
|
|
1816
|
+
rsp = client.RegisterFunctionTargets(model)
|
|
1718
1817
|
result = rsp.to_json_string()
|
|
1719
1818
|
try:
|
|
1720
1819
|
json_obj = json.loads(result)
|
|
@@ -1733,7 +1832,7 @@ def doCreateTargetGroup(args, parsed_globals):
|
|
|
1733
1832
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1734
1833
|
|
|
1735
1834
|
|
|
1736
|
-
def
|
|
1835
|
+
def doDescribeCustomizedConfigList(args, parsed_globals):
|
|
1737
1836
|
g_param = parse_global_arg(parsed_globals)
|
|
1738
1837
|
|
|
1739
1838
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1743,7 +1842,10 @@ def doDeleteRewrite(args, parsed_globals):
|
|
|
1743
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1844
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1850
|
else:
|
|
1749
1851
|
cred = credential.Credential(
|
|
@@ -1755,18 +1857,18 @@ def doDeleteRewrite(args, parsed_globals):
|
|
|
1755
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1859
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1861
|
if g_param[OptionsDefine.Language]:
|
|
1760
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1762
1864
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1763
1865
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1764
1866
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1765
|
-
model = models.
|
|
1867
|
+
model = models.DescribeCustomizedConfigListRequest()
|
|
1766
1868
|
model.from_json_string(json.dumps(args))
|
|
1767
1869
|
start_time = time.time()
|
|
1768
1870
|
while True:
|
|
1769
|
-
rsp = client.
|
|
1871
|
+
rsp = client.DescribeCustomizedConfigList(model)
|
|
1770
1872
|
result = rsp.to_json_string()
|
|
1771
1873
|
try:
|
|
1772
1874
|
json_obj = json.loads(result)
|
|
@@ -1785,7 +1887,7 @@ def doDeleteRewrite(args, parsed_globals):
|
|
|
1785
1887
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1786
1888
|
|
|
1787
1889
|
|
|
1788
|
-
def
|
|
1890
|
+
def doModifyRule(args, parsed_globals):
|
|
1789
1891
|
g_param = parse_global_arg(parsed_globals)
|
|
1790
1892
|
|
|
1791
1893
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1795,7 +1897,10 @@ def doDescribeTargetGroupInstances(args, parsed_globals):
|
|
|
1795
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1899
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1905
|
else:
|
|
1801
1906
|
cred = credential.Credential(
|
|
@@ -1807,18 +1912,18 @@ def doDescribeTargetGroupInstances(args, parsed_globals):
|
|
|
1807
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1914
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1916
|
if g_param[OptionsDefine.Language]:
|
|
1812
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1814
1919
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1815
1920
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1816
1921
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1817
|
-
model = models.
|
|
1922
|
+
model = models.ModifyRuleRequest()
|
|
1818
1923
|
model.from_json_string(json.dumps(args))
|
|
1819
1924
|
start_time = time.time()
|
|
1820
1925
|
while True:
|
|
1821
|
-
rsp = client.
|
|
1926
|
+
rsp = client.ModifyRule(model)
|
|
1822
1927
|
result = rsp.to_json_string()
|
|
1823
1928
|
try:
|
|
1824
1929
|
json_obj = json.loads(result)
|
|
@@ -1837,7 +1942,7 @@ def doDescribeTargetGroupInstances(args, parsed_globals):
|
|
|
1837
1942
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1838
1943
|
|
|
1839
1944
|
|
|
1840
|
-
def
|
|
1945
|
+
def doSetLoadBalancerClsLog(args, parsed_globals):
|
|
1841
1946
|
g_param = parse_global_arg(parsed_globals)
|
|
1842
1947
|
|
|
1843
1948
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1847,7 +1952,10 @@ def doAssociateTargetGroups(args, parsed_globals):
|
|
|
1847
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
1954
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
1960
|
else:
|
|
1853
1961
|
cred = credential.Credential(
|
|
@@ -1859,18 +1967,18 @@ def doAssociateTargetGroups(args, parsed_globals):
|
|
|
1859
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
1969
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
1971
|
if g_param[OptionsDefine.Language]:
|
|
1864
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1866
1974
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1867
1975
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1868
1976
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1869
|
-
model = models.
|
|
1977
|
+
model = models.SetLoadBalancerClsLogRequest()
|
|
1870
1978
|
model.from_json_string(json.dumps(args))
|
|
1871
1979
|
start_time = time.time()
|
|
1872
1980
|
while True:
|
|
1873
|
-
rsp = client.
|
|
1981
|
+
rsp = client.SetLoadBalancerClsLog(model)
|
|
1874
1982
|
result = rsp.to_json_string()
|
|
1875
1983
|
try:
|
|
1876
1984
|
json_obj = json.loads(result)
|
|
@@ -1889,7 +1997,7 @@ def doAssociateTargetGroups(args, parsed_globals):
|
|
|
1889
1997
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
1998
|
|
|
1891
1999
|
|
|
1892
|
-
def
|
|
2000
|
+
def doModifyBlockIPList(args, parsed_globals):
|
|
1893
2001
|
g_param = parse_global_arg(parsed_globals)
|
|
1894
2002
|
|
|
1895
2003
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1899,7 +2007,10 @@ def doCreateLoadBalancerSnatIps(args, parsed_globals):
|
|
|
1899
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2009
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2015
|
else:
|
|
1905
2016
|
cred = credential.Credential(
|
|
@@ -1911,18 +2022,18 @@ def doCreateLoadBalancerSnatIps(args, parsed_globals):
|
|
|
1911
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2024
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2026
|
if g_param[OptionsDefine.Language]:
|
|
1916
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1918
2029
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1919
2030
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1920
2031
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1921
|
-
model = models.
|
|
2032
|
+
model = models.ModifyBlockIPListRequest()
|
|
1922
2033
|
model.from_json_string(json.dumps(args))
|
|
1923
2034
|
start_time = time.time()
|
|
1924
2035
|
while True:
|
|
1925
|
-
rsp = client.
|
|
2036
|
+
rsp = client.ModifyBlockIPList(model)
|
|
1926
2037
|
result = rsp.to_json_string()
|
|
1927
2038
|
try:
|
|
1928
2039
|
json_obj = json.loads(result)
|
|
@@ -1941,7 +2052,7 @@ def doCreateLoadBalancerSnatIps(args, parsed_globals):
|
|
|
1941
2052
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1942
2053
|
|
|
1943
2054
|
|
|
1944
|
-
def
|
|
2055
|
+
def doDescribeRewrite(args, parsed_globals):
|
|
1945
2056
|
g_param = parse_global_arg(parsed_globals)
|
|
1946
2057
|
|
|
1947
2058
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1951,7 +2062,10 @@ def doDescribeLoadBalancersDetail(args, parsed_globals):
|
|
|
1951
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2064
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2070
|
else:
|
|
1957
2071
|
cred = credential.Credential(
|
|
@@ -1963,18 +2077,18 @@ def doDescribeLoadBalancersDetail(args, parsed_globals):
|
|
|
1963
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2079
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2081
|
if g_param[OptionsDefine.Language]:
|
|
1968
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1970
2084
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1971
2085
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1972
2086
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1973
|
-
model = models.
|
|
2087
|
+
model = models.DescribeRewriteRequest()
|
|
1974
2088
|
model.from_json_string(json.dumps(args))
|
|
1975
2089
|
start_time = time.time()
|
|
1976
2090
|
while True:
|
|
1977
|
-
rsp = client.
|
|
2091
|
+
rsp = client.DescribeRewrite(model)
|
|
1978
2092
|
result = rsp.to_json_string()
|
|
1979
2093
|
try:
|
|
1980
2094
|
json_obj = json.loads(result)
|
|
@@ -1993,7 +2107,7 @@ def doDescribeLoadBalancersDetail(args, parsed_globals):
|
|
|
1993
2107
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1994
2108
|
|
|
1995
2109
|
|
|
1996
|
-
def
|
|
2110
|
+
def doModifyTargetPort(args, parsed_globals):
|
|
1997
2111
|
g_param = parse_global_arg(parsed_globals)
|
|
1998
2112
|
|
|
1999
2113
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2003,7 +2117,10 @@ def doDeregisterTargetGroupInstances(args, parsed_globals):
|
|
|
2003
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2119
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2125
|
else:
|
|
2009
2126
|
cred = credential.Credential(
|
|
@@ -2015,18 +2132,18 @@ def doDeregisterTargetGroupInstances(args, parsed_globals):
|
|
|
2015
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2134
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2136
|
if g_param[OptionsDefine.Language]:
|
|
2020
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2022
2139
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2023
2140
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2024
2141
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2025
|
-
model = models.
|
|
2142
|
+
model = models.ModifyTargetPortRequest()
|
|
2026
2143
|
model.from_json_string(json.dumps(args))
|
|
2027
2144
|
start_time = time.time()
|
|
2028
2145
|
while True:
|
|
2029
|
-
rsp = client.
|
|
2146
|
+
rsp = client.ModifyTargetPort(model)
|
|
2030
2147
|
result = rsp.to_json_string()
|
|
2031
2148
|
try:
|
|
2032
2149
|
json_obj = json.loads(result)
|
|
@@ -2045,7 +2162,7 @@ def doDeregisterTargetGroupInstances(args, parsed_globals):
|
|
|
2045
2162
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2046
2163
|
|
|
2047
2164
|
|
|
2048
|
-
def
|
|
2165
|
+
def doDeregisterFunctionTargets(args, parsed_globals):
|
|
2049
2166
|
g_param = parse_global_arg(parsed_globals)
|
|
2050
2167
|
|
|
2051
2168
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2055,7 +2172,10 @@ def doDescribeLoadBalancers(args, parsed_globals):
|
|
|
2055
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2174
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2180
|
else:
|
|
2061
2181
|
cred = credential.Credential(
|
|
@@ -2067,18 +2187,18 @@ def doDescribeLoadBalancers(args, parsed_globals):
|
|
|
2067
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2189
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2191
|
if g_param[OptionsDefine.Language]:
|
|
2072
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2074
2194
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2075
2195
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2076
2196
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2077
|
-
model = models.
|
|
2197
|
+
model = models.DeregisterFunctionTargetsRequest()
|
|
2078
2198
|
model.from_json_string(json.dumps(args))
|
|
2079
2199
|
start_time = time.time()
|
|
2080
2200
|
while True:
|
|
2081
|
-
rsp = client.
|
|
2201
|
+
rsp = client.DeregisterFunctionTargets(model)
|
|
2082
2202
|
result = rsp.to_json_string()
|
|
2083
2203
|
try:
|
|
2084
2204
|
json_obj = json.loads(result)
|
|
@@ -2097,7 +2217,7 @@ def doDescribeLoadBalancers(args, parsed_globals):
|
|
|
2097
2217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2098
2218
|
|
|
2099
2219
|
|
|
2100
|
-
def
|
|
2220
|
+
def doModifyLoadBalancerSla(args, parsed_globals):
|
|
2101
2221
|
g_param = parse_global_arg(parsed_globals)
|
|
2102
2222
|
|
|
2103
2223
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2107,7 +2227,10 @@ def doDescribeBlockIPList(args, parsed_globals):
|
|
|
2107
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2229
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2235
|
else:
|
|
2113
2236
|
cred = credential.Credential(
|
|
@@ -2119,18 +2242,18 @@ def doDescribeBlockIPList(args, parsed_globals):
|
|
|
2119
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2244
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2246
|
if g_param[OptionsDefine.Language]:
|
|
2124
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2126
2249
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2127
2250
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2128
2251
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2129
|
-
model = models.
|
|
2252
|
+
model = models.ModifyLoadBalancerSlaRequest()
|
|
2130
2253
|
model.from_json_string(json.dumps(args))
|
|
2131
2254
|
start_time = time.time()
|
|
2132
2255
|
while True:
|
|
2133
|
-
rsp = client.
|
|
2256
|
+
rsp = client.ModifyLoadBalancerSla(model)
|
|
2134
2257
|
result = rsp.to_json_string()
|
|
2135
2258
|
try:
|
|
2136
2259
|
json_obj = json.loads(result)
|
|
@@ -2149,7 +2272,7 @@ def doDescribeBlockIPList(args, parsed_globals):
|
|
|
2149
2272
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2150
2273
|
|
|
2151
2274
|
|
|
2152
|
-
def
|
|
2275
|
+
def doDescribeBlockIPTask(args, parsed_globals):
|
|
2153
2276
|
g_param = parse_global_arg(parsed_globals)
|
|
2154
2277
|
|
|
2155
2278
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2159,7 +2282,10 @@ def doDescribeListeners(args, parsed_globals):
|
|
|
2159
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2284
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2290
|
else:
|
|
2165
2291
|
cred = credential.Credential(
|
|
@@ -2171,18 +2297,18 @@ def doDescribeListeners(args, parsed_globals):
|
|
|
2171
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2299
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2301
|
if g_param[OptionsDefine.Language]:
|
|
2176
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2178
2304
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2179
2305
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2180
2306
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2181
|
-
model = models.
|
|
2307
|
+
model = models.DescribeBlockIPTaskRequest()
|
|
2182
2308
|
model.from_json_string(json.dumps(args))
|
|
2183
2309
|
start_time = time.time()
|
|
2184
2310
|
while True:
|
|
2185
|
-
rsp = client.
|
|
2311
|
+
rsp = client.DescribeBlockIPTask(model)
|
|
2186
2312
|
result = rsp.to_json_string()
|
|
2187
2313
|
try:
|
|
2188
2314
|
json_obj = json.loads(result)
|
|
@@ -2201,7 +2327,7 @@ def doDescribeListeners(args, parsed_globals):
|
|
|
2201
2327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2202
2328
|
|
|
2203
2329
|
|
|
2204
|
-
def
|
|
2330
|
+
def doDescribeClassicalLBByInstanceId(args, parsed_globals):
|
|
2205
2331
|
g_param = parse_global_arg(parsed_globals)
|
|
2206
2332
|
|
|
2207
2333
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2211,7 +2337,10 @@ def doDescribeClassicalLBTargets(args, parsed_globals):
|
|
|
2211
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2339
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2345
|
else:
|
|
2217
2346
|
cred = credential.Credential(
|
|
@@ -2223,18 +2352,18 @@ def doDescribeClassicalLBTargets(args, parsed_globals):
|
|
|
2223
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2354
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2356
|
if g_param[OptionsDefine.Language]:
|
|
2228
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2230
2359
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2231
2360
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2232
2361
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2233
|
-
model = models.
|
|
2362
|
+
model = models.DescribeClassicalLBByInstanceIdRequest()
|
|
2234
2363
|
model.from_json_string(json.dumps(args))
|
|
2235
2364
|
start_time = time.time()
|
|
2236
2365
|
while True:
|
|
2237
|
-
rsp = client.
|
|
2366
|
+
rsp = client.DescribeClassicalLBByInstanceId(model)
|
|
2238
2367
|
result = rsp.to_json_string()
|
|
2239
2368
|
try:
|
|
2240
2369
|
json_obj = json.loads(result)
|
|
@@ -2253,7 +2382,7 @@ def doDescribeClassicalLBTargets(args, parsed_globals):
|
|
|
2253
2382
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2254
2383
|
|
|
2255
2384
|
|
|
2256
|
-
def
|
|
2385
|
+
def doDescribeLoadBalancerTraffic(args, parsed_globals):
|
|
2257
2386
|
g_param = parse_global_arg(parsed_globals)
|
|
2258
2387
|
|
|
2259
2388
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2263,7 +2392,10 @@ def doCreateTopic(args, parsed_globals):
|
|
|
2263
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2394
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2400
|
else:
|
|
2269
2401
|
cred = credential.Credential(
|
|
@@ -2275,18 +2407,18 @@ def doCreateTopic(args, parsed_globals):
|
|
|
2275
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2409
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2411
|
if g_param[OptionsDefine.Language]:
|
|
2280
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2282
2414
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2283
2415
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2284
2416
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2285
|
-
model = models.
|
|
2417
|
+
model = models.DescribeLoadBalancerTrafficRequest()
|
|
2286
2418
|
model.from_json_string(json.dumps(args))
|
|
2287
2419
|
start_time = time.time()
|
|
2288
2420
|
while True:
|
|
2289
|
-
rsp = client.
|
|
2421
|
+
rsp = client.DescribeLoadBalancerTraffic(model)
|
|
2290
2422
|
result = rsp.to_json_string()
|
|
2291
2423
|
try:
|
|
2292
2424
|
json_obj = json.loads(result)
|
|
@@ -2305,7 +2437,7 @@ def doCreateTopic(args, parsed_globals):
|
|
|
2305
2437
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2306
2438
|
|
|
2307
2439
|
|
|
2308
|
-
def
|
|
2440
|
+
def doDescribeCrossTargets(args, parsed_globals):
|
|
2309
2441
|
g_param = parse_global_arg(parsed_globals)
|
|
2310
2442
|
|
|
2311
2443
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2315,7 +2447,10 @@ def doBatchRegisterTargets(args, parsed_globals):
|
|
|
2315
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2449
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2455
|
else:
|
|
2321
2456
|
cred = credential.Credential(
|
|
@@ -2327,18 +2462,18 @@ def doBatchRegisterTargets(args, parsed_globals):
|
|
|
2327
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2464
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2466
|
if g_param[OptionsDefine.Language]:
|
|
2332
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2334
2469
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2335
2470
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2336
2471
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2337
|
-
model = models.
|
|
2472
|
+
model = models.DescribeCrossTargetsRequest()
|
|
2338
2473
|
model.from_json_string(json.dumps(args))
|
|
2339
2474
|
start_time = time.time()
|
|
2340
2475
|
while True:
|
|
2341
|
-
rsp = client.
|
|
2476
|
+
rsp = client.DescribeCrossTargets(model)
|
|
2342
2477
|
result = rsp.to_json_string()
|
|
2343
2478
|
try:
|
|
2344
2479
|
json_obj = json.loads(result)
|
|
@@ -2357,7 +2492,7 @@ def doBatchRegisterTargets(args, parsed_globals):
|
|
|
2357
2492
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2358
2493
|
|
|
2359
2494
|
|
|
2360
|
-
def
|
|
2495
|
+
def doDescribeTargetHealth(args, parsed_globals):
|
|
2361
2496
|
g_param = parse_global_arg(parsed_globals)
|
|
2362
2497
|
|
|
2363
2498
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2367,7 +2502,10 @@ def doRegisterFunctionTargets(args, parsed_globals):
|
|
|
2367
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2504
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2510
|
else:
|
|
2373
2511
|
cred = credential.Credential(
|
|
@@ -2379,18 +2517,18 @@ def doRegisterFunctionTargets(args, parsed_globals):
|
|
|
2379
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2519
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2521
|
if g_param[OptionsDefine.Language]:
|
|
2384
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2386
2524
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2387
2525
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2388
2526
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2389
|
-
model = models.
|
|
2527
|
+
model = models.DescribeTargetHealthRequest()
|
|
2390
2528
|
model.from_json_string(json.dumps(args))
|
|
2391
2529
|
start_time = time.time()
|
|
2392
2530
|
while True:
|
|
2393
|
-
rsp = client.
|
|
2531
|
+
rsp = client.DescribeTargetHealth(model)
|
|
2394
2532
|
result = rsp.to_json_string()
|
|
2395
2533
|
try:
|
|
2396
2534
|
json_obj = json.loads(result)
|
|
@@ -2409,7 +2547,7 @@ def doRegisterFunctionTargets(args, parsed_globals):
|
|
|
2409
2547
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2410
2548
|
|
|
2411
2549
|
|
|
2412
|
-
def
|
|
2550
|
+
def doManualRewrite(args, parsed_globals):
|
|
2413
2551
|
g_param = parse_global_arg(parsed_globals)
|
|
2414
2552
|
|
|
2415
2553
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2419,7 +2557,10 @@ def doDescribeClsLogSet(args, parsed_globals):
|
|
|
2419
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2559
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2565
|
else:
|
|
2425
2566
|
cred = credential.Credential(
|
|
@@ -2431,18 +2572,18 @@ def doDescribeClsLogSet(args, parsed_globals):
|
|
|
2431
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2574
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2576
|
if g_param[OptionsDefine.Language]:
|
|
2436
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2438
2579
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2439
2580
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2440
2581
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2441
|
-
model = models.
|
|
2582
|
+
model = models.ManualRewriteRequest()
|
|
2442
2583
|
model.from_json_string(json.dumps(args))
|
|
2443
2584
|
start_time = time.time()
|
|
2444
2585
|
while True:
|
|
2445
|
-
rsp = client.
|
|
2586
|
+
rsp = client.ManualRewrite(model)
|
|
2446
2587
|
result = rsp.to_json_string()
|
|
2447
2588
|
try:
|
|
2448
2589
|
json_obj = json.loads(result)
|
|
@@ -2461,7 +2602,7 @@ def doDescribeClsLogSet(args, parsed_globals):
|
|
|
2461
2602
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2462
2603
|
|
|
2463
2604
|
|
|
2464
|
-
def
|
|
2605
|
+
def doModifyFunctionTargets(args, parsed_globals):
|
|
2465
2606
|
g_param = parse_global_arg(parsed_globals)
|
|
2466
2607
|
|
|
2467
2608
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2471,7 +2612,10 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
2471
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2614
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2620
|
else:
|
|
2477
2621
|
cred = credential.Credential(
|
|
@@ -2483,18 +2627,18 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
2483
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2629
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2631
|
if g_param[OptionsDefine.Language]:
|
|
2488
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2490
2634
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2491
2635
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2492
2636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2493
|
-
model = models.
|
|
2637
|
+
model = models.ModifyFunctionTargetsRequest()
|
|
2494
2638
|
model.from_json_string(json.dumps(args))
|
|
2495
2639
|
start_time = time.time()
|
|
2496
2640
|
while True:
|
|
2497
|
-
rsp = client.
|
|
2641
|
+
rsp = client.ModifyFunctionTargets(model)
|
|
2498
2642
|
result = rsp.to_json_string()
|
|
2499
2643
|
try:
|
|
2500
2644
|
json_obj = json.loads(result)
|
|
@@ -2513,7 +2657,7 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
2513
2657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2514
2658
|
|
|
2515
2659
|
|
|
2516
|
-
def
|
|
2660
|
+
def doDeleteLoadBalancerSnatIps(args, parsed_globals):
|
|
2517
2661
|
g_param = parse_global_arg(parsed_globals)
|
|
2518
2662
|
|
|
2519
2663
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2523,7 +2667,10 @@ def doDescribeCustomizedConfigList(args, parsed_globals):
|
|
|
2523
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2669
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2675
|
else:
|
|
2529
2676
|
cred = credential.Credential(
|
|
@@ -2535,18 +2682,18 @@ def doDescribeCustomizedConfigList(args, parsed_globals):
|
|
|
2535
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2684
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2686
|
if g_param[OptionsDefine.Language]:
|
|
2540
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2542
2689
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2543
2690
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2544
2691
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2545
|
-
model = models.
|
|
2692
|
+
model = models.DeleteLoadBalancerSnatIpsRequest()
|
|
2546
2693
|
model.from_json_string(json.dumps(args))
|
|
2547
2694
|
start_time = time.time()
|
|
2548
2695
|
while True:
|
|
2549
|
-
rsp = client.
|
|
2696
|
+
rsp = client.DeleteLoadBalancerSnatIps(model)
|
|
2550
2697
|
result = rsp.to_json_string()
|
|
2551
2698
|
try:
|
|
2552
2699
|
json_obj = json.loads(result)
|
|
@@ -2565,7 +2712,7 @@ def doDescribeCustomizedConfigList(args, parsed_globals):
|
|
|
2565
2712
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2566
2713
|
|
|
2567
2714
|
|
|
2568
|
-
def
|
|
2715
|
+
def doCreateRule(args, parsed_globals):
|
|
2569
2716
|
g_param = parse_global_arg(parsed_globals)
|
|
2570
2717
|
|
|
2571
2718
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2575,7 +2722,10 @@ def doModifyTargetWeight(args, parsed_globals):
|
|
|
2575
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2724
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2730
|
else:
|
|
2581
2731
|
cred = credential.Credential(
|
|
@@ -2587,18 +2737,18 @@ def doModifyTargetWeight(args, parsed_globals):
|
|
|
2587
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2739
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2741
|
if g_param[OptionsDefine.Language]:
|
|
2592
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2594
2744
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2595
2745
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2596
2746
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2597
|
-
model = models.
|
|
2747
|
+
model = models.CreateRuleRequest()
|
|
2598
2748
|
model.from_json_string(json.dumps(args))
|
|
2599
2749
|
start_time = time.time()
|
|
2600
2750
|
while True:
|
|
2601
|
-
rsp = client.
|
|
2751
|
+
rsp = client.CreateRule(model)
|
|
2602
2752
|
result = rsp.to_json_string()
|
|
2603
2753
|
try:
|
|
2604
2754
|
json_obj = json.loads(result)
|
|
@@ -2617,7 +2767,7 @@ def doModifyTargetWeight(args, parsed_globals):
|
|
|
2617
2767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2618
2768
|
|
|
2619
2769
|
|
|
2620
|
-
def
|
|
2770
|
+
def doAddCustomizedConfig(args, parsed_globals):
|
|
2621
2771
|
g_param = parse_global_arg(parsed_globals)
|
|
2622
2772
|
|
|
2623
2773
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2627,7 +2777,10 @@ def doModifyLoadBalancersProject(args, parsed_globals):
|
|
|
2627
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2779
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2785
|
else:
|
|
2633
2786
|
cred = credential.Credential(
|
|
@@ -2639,18 +2792,18 @@ def doModifyLoadBalancersProject(args, parsed_globals):
|
|
|
2639
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2794
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2796
|
if g_param[OptionsDefine.Language]:
|
|
2644
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2646
2799
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2647
2800
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2648
2801
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2649
|
-
model = models.
|
|
2802
|
+
model = models.AddCustomizedConfigRequest()
|
|
2650
2803
|
model.from_json_string(json.dumps(args))
|
|
2651
2804
|
start_time = time.time()
|
|
2652
2805
|
while True:
|
|
2653
|
-
rsp = client.
|
|
2806
|
+
rsp = client.AddCustomizedConfig(model)
|
|
2654
2807
|
result = rsp.to_json_string()
|
|
2655
2808
|
try:
|
|
2656
2809
|
json_obj = json.loads(result)
|
|
@@ -2669,7 +2822,7 @@ def doModifyLoadBalancersProject(args, parsed_globals):
|
|
|
2669
2822
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2670
2823
|
|
|
2671
2824
|
|
|
2672
|
-
def
|
|
2825
|
+
def doModifyDomain(args, parsed_globals):
|
|
2673
2826
|
g_param = parse_global_arg(parsed_globals)
|
|
2674
2827
|
|
|
2675
2828
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2679,7 +2832,10 @@ def doDescribeCrossTargets(args, parsed_globals):
|
|
|
2679
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2834
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2840
|
else:
|
|
2685
2841
|
cred = credential.Credential(
|
|
@@ -2691,18 +2847,18 @@ def doDescribeCrossTargets(args, parsed_globals):
|
|
|
2691
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2849
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2851
|
if g_param[OptionsDefine.Language]:
|
|
2696
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2698
2854
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2699
2855
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2700
2856
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2701
|
-
model = models.
|
|
2857
|
+
model = models.ModifyDomainRequest()
|
|
2702
2858
|
model.from_json_string(json.dumps(args))
|
|
2703
2859
|
start_time = time.time()
|
|
2704
2860
|
while True:
|
|
2705
|
-
rsp = client.
|
|
2861
|
+
rsp = client.ModifyDomain(model)
|
|
2706
2862
|
result = rsp.to_json_string()
|
|
2707
2863
|
try:
|
|
2708
2864
|
json_obj = json.loads(result)
|
|
@@ -2721,7 +2877,7 @@ def doDescribeCrossTargets(args, parsed_globals):
|
|
|
2721
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2722
2878
|
|
|
2723
2879
|
|
|
2724
|
-
def
|
|
2880
|
+
def doInquiryPriceRenewLoadBalancer(args, parsed_globals):
|
|
2725
2881
|
g_param = parse_global_arg(parsed_globals)
|
|
2726
2882
|
|
|
2727
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2731,7 +2887,10 @@ def doSetCustomizedConfigForLoadBalancer(args, parsed_globals):
|
|
|
2731
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2889
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2895
|
else:
|
|
2737
2896
|
cred = credential.Credential(
|
|
@@ -2743,18 +2902,18 @@ def doSetCustomizedConfigForLoadBalancer(args, parsed_globals):
|
|
|
2743
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2904
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2906
|
if g_param[OptionsDefine.Language]:
|
|
2748
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2750
2909
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2751
2910
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2752
2911
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2753
|
-
model = models.
|
|
2912
|
+
model = models.InquiryPriceRenewLoadBalancerRequest()
|
|
2754
2913
|
model.from_json_string(json.dumps(args))
|
|
2755
2914
|
start_time = time.time()
|
|
2756
2915
|
while True:
|
|
2757
|
-
rsp = client.
|
|
2916
|
+
rsp = client.InquiryPriceRenewLoadBalancer(model)
|
|
2758
2917
|
result = rsp.to_json_string()
|
|
2759
2918
|
try:
|
|
2760
2919
|
json_obj = json.loads(result)
|
|
@@ -2773,7 +2932,7 @@ def doSetCustomizedConfigForLoadBalancer(args, parsed_globals):
|
|
|
2773
2932
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2774
2933
|
|
|
2775
2934
|
|
|
2776
|
-
def
|
|
2935
|
+
def doDescribeLoadBalancerOverview(args, parsed_globals):
|
|
2777
2936
|
g_param = parse_global_arg(parsed_globals)
|
|
2778
2937
|
|
|
2779
2938
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2783,7 +2942,10 @@ def doDescribeTargetGroups(args, parsed_globals):
|
|
|
2783
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
2944
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
2950
|
else:
|
|
2789
2951
|
cred = credential.Credential(
|
|
@@ -2795,18 +2957,18 @@ def doDescribeTargetGroups(args, parsed_globals):
|
|
|
2795
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
2959
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
2961
|
if g_param[OptionsDefine.Language]:
|
|
2800
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2802
2964
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2803
2965
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2804
2966
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2805
|
-
model = models.
|
|
2967
|
+
model = models.DescribeLoadBalancerOverviewRequest()
|
|
2806
2968
|
model.from_json_string(json.dumps(args))
|
|
2807
2969
|
start_time = time.time()
|
|
2808
2970
|
while True:
|
|
2809
|
-
rsp = client.
|
|
2971
|
+
rsp = client.DescribeLoadBalancerOverview(model)
|
|
2810
2972
|
result = rsp.to_json_string()
|
|
2811
2973
|
try:
|
|
2812
2974
|
json_obj = json.loads(result)
|
|
@@ -2825,7 +2987,7 @@ def doDescribeTargetGroups(args, parsed_globals):
|
|
|
2825
2987
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2826
2988
|
|
|
2827
2989
|
|
|
2828
|
-
def
|
|
2990
|
+
def doDeleteLoadBalancer(args, parsed_globals):
|
|
2829
2991
|
g_param = parse_global_arg(parsed_globals)
|
|
2830
2992
|
|
|
2831
2993
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2835,7 +2997,10 @@ def doDescribeRewrite(args, parsed_globals):
|
|
|
2835
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
2999
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3005
|
else:
|
|
2841
3006
|
cred = credential.Credential(
|
|
@@ -2847,18 +3012,18 @@ def doDescribeRewrite(args, parsed_globals):
|
|
|
2847
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3014
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3016
|
if g_param[OptionsDefine.Language]:
|
|
2852
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2854
3019
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2855
3020
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2856
3021
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2857
|
-
model = models.
|
|
3022
|
+
model = models.DeleteLoadBalancerRequest()
|
|
2858
3023
|
model.from_json_string(json.dumps(args))
|
|
2859
3024
|
start_time = time.time()
|
|
2860
3025
|
while True:
|
|
2861
|
-
rsp = client.
|
|
3026
|
+
rsp = client.DeleteLoadBalancer(model)
|
|
2862
3027
|
result = rsp.to_json_string()
|
|
2863
3028
|
try:
|
|
2864
3029
|
json_obj = json.loads(result)
|
|
@@ -2877,7 +3042,7 @@ def doDescribeRewrite(args, parsed_globals):
|
|
|
2877
3042
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2878
3043
|
|
|
2879
3044
|
|
|
2880
|
-
def
|
|
3045
|
+
def doInquiryPriceCreateLoadBalancer(args, parsed_globals):
|
|
2881
3046
|
g_param = parse_global_arg(parsed_globals)
|
|
2882
3047
|
|
|
2883
3048
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2887,7 +3052,10 @@ def doModifyRule(args, parsed_globals):
|
|
|
2887
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3054
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3060
|
else:
|
|
2893
3061
|
cred = credential.Credential(
|
|
@@ -2899,18 +3067,18 @@ def doModifyRule(args, parsed_globals):
|
|
|
2899
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3069
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3071
|
if g_param[OptionsDefine.Language]:
|
|
2904
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2906
3074
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2907
3075
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2908
3076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2909
|
-
model = models.
|
|
3077
|
+
model = models.InquiryPriceCreateLoadBalancerRequest()
|
|
2910
3078
|
model.from_json_string(json.dumps(args))
|
|
2911
3079
|
start_time = time.time()
|
|
2912
3080
|
while True:
|
|
2913
|
-
rsp = client.
|
|
3081
|
+
rsp = client.InquiryPriceCreateLoadBalancer(model)
|
|
2914
3082
|
result = rsp.to_json_string()
|
|
2915
3083
|
try:
|
|
2916
3084
|
json_obj = json.loads(result)
|
|
@@ -2939,7 +3107,10 @@ def doDeleteRule(args, parsed_globals):
|
|
|
2939
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3109
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3115
|
else:
|
|
2945
3116
|
cred = credential.Credential(
|
|
@@ -2951,7 +3122,7 @@ def doDeleteRule(args, parsed_globals):
|
|
|
2951
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3124
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3126
|
if g_param[OptionsDefine.Language]:
|
|
2956
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2981,7 +3152,7 @@ def doDeleteRule(args, parsed_globals):
|
|
|
2981
3152
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2982
3153
|
|
|
2983
3154
|
|
|
2984
|
-
def
|
|
3155
|
+
def doModifyCustomizedConfig(args, parsed_globals):
|
|
2985
3156
|
g_param = parse_global_arg(parsed_globals)
|
|
2986
3157
|
|
|
2987
3158
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2991,7 +3162,10 @@ def doSetLoadBalancerClsLog(args, parsed_globals):
|
|
|
2991
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3164
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3170
|
else:
|
|
2997
3171
|
cred = credential.Credential(
|
|
@@ -3003,18 +3177,73 @@ def doSetLoadBalancerClsLog(args, parsed_globals):
|
|
|
3003
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3179
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3181
|
if g_param[OptionsDefine.Language]:
|
|
3008
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3010
3184
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3011
3185
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3012
3186
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3013
|
-
model = models.
|
|
3187
|
+
model = models.ModifyCustomizedConfigRequest()
|
|
3014
3188
|
model.from_json_string(json.dumps(args))
|
|
3015
3189
|
start_time = time.time()
|
|
3016
3190
|
while True:
|
|
3017
|
-
rsp = client.
|
|
3191
|
+
rsp = client.ModifyCustomizedConfig(model)
|
|
3192
|
+
result = rsp.to_json_string()
|
|
3193
|
+
try:
|
|
3194
|
+
json_obj = json.loads(result)
|
|
3195
|
+
except TypeError as e:
|
|
3196
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3197
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3198
|
+
break
|
|
3199
|
+
cur_time = time.time()
|
|
3200
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3201
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3202
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3203
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3204
|
+
else:
|
|
3205
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3206
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3207
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3208
|
+
|
|
3209
|
+
|
|
3210
|
+
def doDescribeTaskStatus(args, parsed_globals):
|
|
3211
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3212
|
+
|
|
3213
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3214
|
+
cred = credential.CVMRoleCredential()
|
|
3215
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3216
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3217
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3218
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3219
|
+
)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3224
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3225
|
+
else:
|
|
3226
|
+
cred = credential.Credential(
|
|
3227
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3228
|
+
)
|
|
3229
|
+
http_profile = HttpProfile(
|
|
3230
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3231
|
+
reqMethod="POST",
|
|
3232
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3233
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3234
|
+
)
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3236
|
+
if g_param[OptionsDefine.Language]:
|
|
3237
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3238
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3239
|
+
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3240
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3241
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3242
|
+
model = models.DescribeTaskStatusRequest()
|
|
3243
|
+
model.from_json_string(json.dumps(args))
|
|
3244
|
+
start_time = time.time()
|
|
3245
|
+
while True:
|
|
3246
|
+
rsp = client.DescribeTaskStatus(model)
|
|
3018
3247
|
result = rsp.to_json_string()
|
|
3019
3248
|
try:
|
|
3020
3249
|
json_obj = json.loads(result)
|
|
@@ -3043,7 +3272,10 @@ def doDescribeTargetGroupList(args, parsed_globals):
|
|
|
3043
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3274
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3280
|
else:
|
|
3049
3281
|
cred = credential.Credential(
|
|
@@ -3055,7 +3287,7 @@ def doDescribeTargetGroupList(args, parsed_globals):
|
|
|
3055
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3289
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3291
|
if g_param[OptionsDefine.Language]:
|
|
3060
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3085,7 +3317,7 @@ def doDescribeTargetGroupList(args, parsed_globals):
|
|
|
3085
3317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3086
3318
|
|
|
3087
3319
|
|
|
3088
|
-
def
|
|
3320
|
+
def doDescribeTargetGroups(args, parsed_globals):
|
|
3089
3321
|
g_param = parse_global_arg(parsed_globals)
|
|
3090
3322
|
|
|
3091
3323
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3095,7 +3327,10 @@ def doModifyBlockIPList(args, parsed_globals):
|
|
|
3095
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3329
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3335
|
else:
|
|
3101
3336
|
cred = credential.Credential(
|
|
@@ -3107,18 +3342,18 @@ def doModifyBlockIPList(args, parsed_globals):
|
|
|
3107
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3344
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3346
|
if g_param[OptionsDefine.Language]:
|
|
3112
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3114
3349
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3115
3350
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3116
3351
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3117
|
-
model = models.
|
|
3352
|
+
model = models.DescribeTargetGroupsRequest()
|
|
3118
3353
|
model.from_json_string(json.dumps(args))
|
|
3119
3354
|
start_time = time.time()
|
|
3120
3355
|
while True:
|
|
3121
|
-
rsp = client.
|
|
3356
|
+
rsp = client.DescribeTargetGroups(model)
|
|
3122
3357
|
result = rsp.to_json_string()
|
|
3123
3358
|
try:
|
|
3124
3359
|
json_obj = json.loads(result)
|
|
@@ -3137,7 +3372,7 @@ def doModifyBlockIPList(args, parsed_globals):
|
|
|
3137
3372
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3138
3373
|
|
|
3139
3374
|
|
|
3140
|
-
def
|
|
3375
|
+
def doModifyTargetGroupAttribute(args, parsed_globals):
|
|
3141
3376
|
g_param = parse_global_arg(parsed_globals)
|
|
3142
3377
|
|
|
3143
3378
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3147,7 +3382,10 @@ def doDescribeLBListeners(args, parsed_globals):
|
|
|
3147
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3384
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3390
|
else:
|
|
3153
3391
|
cred = credential.Credential(
|
|
@@ -3159,18 +3397,18 @@ def doDescribeLBListeners(args, parsed_globals):
|
|
|
3159
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3399
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3401
|
if g_param[OptionsDefine.Language]:
|
|
3164
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3166
3404
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3167
3405
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3168
3406
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3169
|
-
model = models.
|
|
3407
|
+
model = models.ModifyTargetGroupAttributeRequest()
|
|
3170
3408
|
model.from_json_string(json.dumps(args))
|
|
3171
3409
|
start_time = time.time()
|
|
3172
3410
|
while True:
|
|
3173
|
-
rsp = client.
|
|
3411
|
+
rsp = client.ModifyTargetGroupAttribute(model)
|
|
3174
3412
|
result = rsp.to_json_string()
|
|
3175
3413
|
try:
|
|
3176
3414
|
json_obj = json.loads(result)
|
|
@@ -3189,7 +3427,7 @@ def doDescribeLBListeners(args, parsed_globals):
|
|
|
3189
3427
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3190
3428
|
|
|
3191
3429
|
|
|
3192
|
-
def
|
|
3430
|
+
def doCreateClsLogSet(args, parsed_globals):
|
|
3193
3431
|
g_param = parse_global_arg(parsed_globals)
|
|
3194
3432
|
|
|
3195
3433
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3199,7 +3437,10 @@ def doDescribeLoadBalancerOverview(args, parsed_globals):
|
|
|
3199
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3439
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3445
|
else:
|
|
3205
3446
|
cred = credential.Credential(
|
|
@@ -3211,18 +3452,18 @@ def doDescribeLoadBalancerOverview(args, parsed_globals):
|
|
|
3211
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3454
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3456
|
if g_param[OptionsDefine.Language]:
|
|
3216
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3218
3459
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3219
3460
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3220
3461
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3221
|
-
model = models.
|
|
3462
|
+
model = models.CreateClsLogSetRequest()
|
|
3222
3463
|
model.from_json_string(json.dumps(args))
|
|
3223
3464
|
start_time = time.time()
|
|
3224
3465
|
while True:
|
|
3225
|
-
rsp = client.
|
|
3466
|
+
rsp = client.CreateClsLogSet(model)
|
|
3226
3467
|
result = rsp.to_json_string()
|
|
3227
3468
|
try:
|
|
3228
3469
|
json_obj = json.loads(result)
|
|
@@ -3241,7 +3482,7 @@ def doDescribeLoadBalancerOverview(args, parsed_globals):
|
|
|
3241
3482
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3242
3483
|
|
|
3243
3484
|
|
|
3244
|
-
def
|
|
3485
|
+
def doDescribeQuota(args, parsed_globals):
|
|
3245
3486
|
g_param = parse_global_arg(parsed_globals)
|
|
3246
3487
|
|
|
3247
3488
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3251,7 +3492,10 @@ def doDescribeTargets(args, parsed_globals):
|
|
|
3251
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3494
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3500
|
else:
|
|
3257
3501
|
cred = credential.Credential(
|
|
@@ -3263,18 +3507,18 @@ def doDescribeTargets(args, parsed_globals):
|
|
|
3263
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3509
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3511
|
if g_param[OptionsDefine.Language]:
|
|
3268
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3270
3514
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3271
3515
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3272
3516
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3273
|
-
model = models.
|
|
3517
|
+
model = models.DescribeQuotaRequest()
|
|
3274
3518
|
model.from_json_string(json.dumps(args))
|
|
3275
3519
|
start_time = time.time()
|
|
3276
3520
|
while True:
|
|
3277
|
-
rsp = client.
|
|
3521
|
+
rsp = client.DescribeQuota(model)
|
|
3278
3522
|
result = rsp.to_json_string()
|
|
3279
3523
|
try:
|
|
3280
3524
|
json_obj = json.loads(result)
|
|
@@ -3293,7 +3537,7 @@ def doDescribeTargets(args, parsed_globals):
|
|
|
3293
3537
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3294
3538
|
|
|
3295
3539
|
|
|
3296
|
-
def
|
|
3540
|
+
def doCreateLoadBalancer(args, parsed_globals):
|
|
3297
3541
|
g_param = parse_global_arg(parsed_globals)
|
|
3298
3542
|
|
|
3299
3543
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3303,7 +3547,10 @@ def doDescribeIdleLoadBalancers(args, parsed_globals):
|
|
|
3303
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3549
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3555
|
else:
|
|
3309
3556
|
cred = credential.Credential(
|
|
@@ -3315,18 +3562,18 @@ def doDescribeIdleLoadBalancers(args, parsed_globals):
|
|
|
3315
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3564
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3566
|
if g_param[OptionsDefine.Language]:
|
|
3320
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3322
3569
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3323
3570
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3324
3571
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3325
|
-
model = models.
|
|
3572
|
+
model = models.CreateLoadBalancerRequest()
|
|
3326
3573
|
model.from_json_string(json.dumps(args))
|
|
3327
3574
|
start_time = time.time()
|
|
3328
3575
|
while True:
|
|
3329
|
-
rsp = client.
|
|
3576
|
+
rsp = client.CreateLoadBalancer(model)
|
|
3330
3577
|
result = rsp.to_json_string()
|
|
3331
3578
|
try:
|
|
3332
3579
|
json_obj = json.loads(result)
|
|
@@ -3345,7 +3592,7 @@ def doDescribeIdleLoadBalancers(args, parsed_globals):
|
|
|
3345
3592
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3346
3593
|
|
|
3347
3594
|
|
|
3348
|
-
def
|
|
3595
|
+
def doDescribeIdleLoadBalancers(args, parsed_globals):
|
|
3349
3596
|
g_param = parse_global_arg(parsed_globals)
|
|
3350
3597
|
|
|
3351
3598
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3355,7 +3602,10 @@ def doMigrateClassicalLoadBalancers(args, parsed_globals):
|
|
|
3355
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3604
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3610
|
else:
|
|
3361
3611
|
cred = credential.Credential(
|
|
@@ -3367,18 +3617,18 @@ def doMigrateClassicalLoadBalancers(args, parsed_globals):
|
|
|
3367
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3619
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3621
|
if g_param[OptionsDefine.Language]:
|
|
3372
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3374
3624
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3375
3625
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3376
3626
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3377
|
-
model = models.
|
|
3627
|
+
model = models.DescribeIdleLoadBalancersRequest()
|
|
3378
3628
|
model.from_json_string(json.dumps(args))
|
|
3379
3629
|
start_time = time.time()
|
|
3380
3630
|
while True:
|
|
3381
|
-
rsp = client.
|
|
3631
|
+
rsp = client.DescribeIdleLoadBalancers(model)
|
|
3382
3632
|
result = rsp.to_json_string()
|
|
3383
3633
|
try:
|
|
3384
3634
|
json_obj = json.loads(result)
|
|
@@ -3397,7 +3647,7 @@ def doMigrateClassicalLoadBalancers(args, parsed_globals):
|
|
|
3397
3647
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3398
3648
|
|
|
3399
3649
|
|
|
3400
|
-
def
|
|
3650
|
+
def doRegisterTargets(args, parsed_globals):
|
|
3401
3651
|
g_param = parse_global_arg(parsed_globals)
|
|
3402
3652
|
|
|
3403
3653
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3407,7 +3657,10 @@ def doRegisterTargetsWithClassicalLB(args, parsed_globals):
|
|
|
3407
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3659
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3665
|
else:
|
|
3413
3666
|
cred = credential.Credential(
|
|
@@ -3419,18 +3672,18 @@ def doRegisterTargetsWithClassicalLB(args, parsed_globals):
|
|
|
3419
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3674
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3676
|
if g_param[OptionsDefine.Language]:
|
|
3424
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3426
3679
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3427
3680
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3428
3681
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3429
|
-
model = models.
|
|
3682
|
+
model = models.RegisterTargetsRequest()
|
|
3430
3683
|
model.from_json_string(json.dumps(args))
|
|
3431
3684
|
start_time = time.time()
|
|
3432
3685
|
while True:
|
|
3433
|
-
rsp = client.
|
|
3686
|
+
rsp = client.RegisterTargets(model)
|
|
3434
3687
|
result = rsp.to_json_string()
|
|
3435
3688
|
try:
|
|
3436
3689
|
json_obj = json.loads(result)
|
|
@@ -3449,7 +3702,7 @@ def doRegisterTargetsWithClassicalLB(args, parsed_globals):
|
|
|
3449
3702
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3450
3703
|
|
|
3451
3704
|
|
|
3452
|
-
def
|
|
3705
|
+
def doDescribeClassicalLBListeners(args, parsed_globals):
|
|
3453
3706
|
g_param = parse_global_arg(parsed_globals)
|
|
3454
3707
|
|
|
3455
3708
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3459,7 +3712,10 @@ def doModifyTargetPort(args, parsed_globals):
|
|
|
3459
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3714
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3720
|
else:
|
|
3465
3721
|
cred = credential.Credential(
|
|
@@ -3471,18 +3727,18 @@ def doModifyTargetPort(args, parsed_globals):
|
|
|
3471
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3729
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3731
|
if g_param[OptionsDefine.Language]:
|
|
3476
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3478
3734
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3479
3735
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3480
3736
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3481
|
-
model = models.
|
|
3737
|
+
model = models.DescribeClassicalLBListenersRequest()
|
|
3482
3738
|
model.from_json_string(json.dumps(args))
|
|
3483
3739
|
start_time = time.time()
|
|
3484
3740
|
while True:
|
|
3485
|
-
rsp = client.
|
|
3741
|
+
rsp = client.DescribeClassicalLBListeners(model)
|
|
3486
3742
|
result = rsp.to_json_string()
|
|
3487
3743
|
try:
|
|
3488
3744
|
json_obj = json.loads(result)
|
|
@@ -3501,7 +3757,7 @@ def doModifyTargetPort(args, parsed_globals):
|
|
|
3501
3757
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3502
3758
|
|
|
3503
3759
|
|
|
3504
|
-
def
|
|
3760
|
+
def doReplaceCertForLoadBalancers(args, parsed_globals):
|
|
3505
3761
|
g_param = parse_global_arg(parsed_globals)
|
|
3506
3762
|
|
|
3507
3763
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3511,7 +3767,10 @@ def doModifyTargetGroupAttribute(args, parsed_globals):
|
|
|
3511
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3769
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3775
|
else:
|
|
3517
3776
|
cred = credential.Credential(
|
|
@@ -3523,18 +3782,18 @@ def doModifyTargetGroupAttribute(args, parsed_globals):
|
|
|
3523
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3784
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3786
|
if g_param[OptionsDefine.Language]:
|
|
3528
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3530
3789
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3531
3790
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3532
3791
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3533
|
-
model = models.
|
|
3792
|
+
model = models.ReplaceCertForLoadBalancersRequest()
|
|
3534
3793
|
model.from_json_string(json.dumps(args))
|
|
3535
3794
|
start_time = time.time()
|
|
3536
3795
|
while True:
|
|
3537
|
-
rsp = client.
|
|
3796
|
+
rsp = client.ReplaceCertForLoadBalancers(model)
|
|
3538
3797
|
result = rsp.to_json_string()
|
|
3539
3798
|
try:
|
|
3540
3799
|
json_obj = json.loads(result)
|
|
@@ -3553,7 +3812,7 @@ def doModifyTargetGroupAttribute(args, parsed_globals):
|
|
|
3553
3812
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3554
3813
|
|
|
3555
3814
|
|
|
3556
|
-
def
|
|
3815
|
+
def doDeleteLoadBalancerListeners(args, parsed_globals):
|
|
3557
3816
|
g_param = parse_global_arg(parsed_globals)
|
|
3558
3817
|
|
|
3559
3818
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3563,7 +3822,10 @@ def doModifyLoadBalancerSla(args, parsed_globals):
|
|
|
3563
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3824
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3830
|
else:
|
|
3569
3831
|
cred = credential.Credential(
|
|
@@ -3575,18 +3837,18 @@ def doModifyLoadBalancerSla(args, parsed_globals):
|
|
|
3575
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3839
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3841
|
if g_param[OptionsDefine.Language]:
|
|
3580
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3582
3844
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3583
3845
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3584
3846
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3585
|
-
model = models.
|
|
3847
|
+
model = models.DeleteLoadBalancerListenersRequest()
|
|
3586
3848
|
model.from_json_string(json.dumps(args))
|
|
3587
3849
|
start_time = time.time()
|
|
3588
3850
|
while True:
|
|
3589
|
-
rsp = client.
|
|
3851
|
+
rsp = client.DeleteLoadBalancerListeners(model)
|
|
3590
3852
|
result = rsp.to_json_string()
|
|
3591
3853
|
try:
|
|
3592
3854
|
json_obj = json.loads(result)
|
|
@@ -3605,7 +3867,7 @@ def doModifyLoadBalancerSla(args, parsed_globals):
|
|
|
3605
3867
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3606
3868
|
|
|
3607
3869
|
|
|
3608
|
-
def
|
|
3870
|
+
def doDeleteTargetGroups(args, parsed_globals):
|
|
3609
3871
|
g_param = parse_global_arg(parsed_globals)
|
|
3610
3872
|
|
|
3611
3873
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3615,7 +3877,10 @@ def doDeregisterTargets(args, parsed_globals):
|
|
|
3615
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3879
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3885
|
else:
|
|
3621
3886
|
cred = credential.Credential(
|
|
@@ -3627,18 +3892,18 @@ def doDeregisterTargets(args, parsed_globals):
|
|
|
3627
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
3894
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
3896
|
if g_param[OptionsDefine.Language]:
|
|
3632
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3634
3899
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3635
3900
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3636
3901
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3637
|
-
model = models.
|
|
3902
|
+
model = models.DeleteTargetGroupsRequest()
|
|
3638
3903
|
model.from_json_string(json.dumps(args))
|
|
3639
3904
|
start_time = time.time()
|
|
3640
3905
|
while True:
|
|
3641
|
-
rsp = client.
|
|
3906
|
+
rsp = client.DeleteTargetGroups(model)
|
|
3642
3907
|
result = rsp.to_json_string()
|
|
3643
3908
|
try:
|
|
3644
3909
|
json_obj = json.loads(result)
|
|
@@ -3657,7 +3922,7 @@ def doDeregisterTargets(args, parsed_globals):
|
|
|
3657
3922
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3658
3923
|
|
|
3659
3924
|
|
|
3660
|
-
def
|
|
3925
|
+
def doDescribeClassicalLBHealthStatus(args, parsed_globals):
|
|
3661
3926
|
g_param = parse_global_arg(parsed_globals)
|
|
3662
3927
|
|
|
3663
3928
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3667,7 +3932,10 @@ def doModifyLoadBalancerAttributes(args, parsed_globals):
|
|
|
3667
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
3934
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
3940
|
else:
|
|
3673
3941
|
cred = credential.Credential(
|
|
@@ -3679,18 +3947,18 @@ def doModifyLoadBalancerAttributes(args, parsed_globals):
|
|
|
3679
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
3949
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
3951
|
if g_param[OptionsDefine.Language]:
|
|
3684
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3686
3954
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3687
3955
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3688
3956
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3689
|
-
model = models.
|
|
3957
|
+
model = models.DescribeClassicalLBHealthStatusRequest()
|
|
3690
3958
|
model.from_json_string(json.dumps(args))
|
|
3691
3959
|
start_time = time.time()
|
|
3692
3960
|
while True:
|
|
3693
|
-
rsp = client.
|
|
3961
|
+
rsp = client.DescribeClassicalLBHealthStatus(model)
|
|
3694
3962
|
result = rsp.to_json_string()
|
|
3695
3963
|
try:
|
|
3696
3964
|
json_obj = json.loads(result)
|
|
@@ -3709,7 +3977,7 @@ def doModifyLoadBalancerAttributes(args, parsed_globals):
|
|
|
3709
3977
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3710
3978
|
|
|
3711
3979
|
|
|
3712
|
-
def
|
|
3980
|
+
def doModifyDomainAttributes(args, parsed_globals):
|
|
3713
3981
|
g_param = parse_global_arg(parsed_globals)
|
|
3714
3982
|
|
|
3715
3983
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3719,7 +3987,10 @@ def doCreateClsLogSet(args, parsed_globals):
|
|
|
3719
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
3989
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
3995
|
else:
|
|
3725
3996
|
cred = credential.Credential(
|
|
@@ -3731,18 +4002,18 @@ def doCreateClsLogSet(args, parsed_globals):
|
|
|
3731
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4004
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4006
|
if g_param[OptionsDefine.Language]:
|
|
3736
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3738
4009
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3739
4010
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3740
4011
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3741
|
-
model = models.
|
|
4012
|
+
model = models.ModifyDomainAttributesRequest()
|
|
3742
4013
|
model.from_json_string(json.dumps(args))
|
|
3743
4014
|
start_time = time.time()
|
|
3744
4015
|
while True:
|
|
3745
|
-
rsp = client.
|
|
4016
|
+
rsp = client.ModifyDomainAttributes(model)
|
|
3746
4017
|
result = rsp.to_json_string()
|
|
3747
4018
|
try:
|
|
3748
4019
|
json_obj = json.loads(result)
|
|
@@ -3761,7 +4032,7 @@ def doCreateClsLogSet(args, parsed_globals):
|
|
|
3761
4032
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3762
4033
|
|
|
3763
4034
|
|
|
3764
|
-
def
|
|
4035
|
+
def doDisassociateTargetGroups(args, parsed_globals):
|
|
3765
4036
|
g_param = parse_global_arg(parsed_globals)
|
|
3766
4037
|
|
|
3767
4038
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3771,7 +4042,10 @@ def doDescribeClassicalLBByInstanceId(args, parsed_globals):
|
|
|
3771
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4044
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4050
|
else:
|
|
3777
4051
|
cred = credential.Credential(
|
|
@@ -3783,18 +4057,18 @@ def doDescribeClassicalLBByInstanceId(args, parsed_globals):
|
|
|
3783
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4059
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4061
|
if g_param[OptionsDefine.Language]:
|
|
3788
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3790
4064
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3791
4065
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3792
4066
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3793
|
-
model = models.
|
|
4067
|
+
model = models.DisassociateTargetGroupsRequest()
|
|
3794
4068
|
model.from_json_string(json.dumps(args))
|
|
3795
4069
|
start_time = time.time()
|
|
3796
4070
|
while True:
|
|
3797
|
-
rsp = client.
|
|
4071
|
+
rsp = client.DisassociateTargetGroups(model)
|
|
3798
4072
|
result = rsp.to_json_string()
|
|
3799
4073
|
try:
|
|
3800
4074
|
json_obj = json.loads(result)
|
|
@@ -3813,7 +4087,7 @@ def doDescribeClassicalLBByInstanceId(args, parsed_globals):
|
|
|
3813
4087
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3814
4088
|
|
|
3815
4089
|
|
|
3816
|
-
def
|
|
4090
|
+
def doDescribeLoadBalancers(args, parsed_globals):
|
|
3817
4091
|
g_param = parse_global_arg(parsed_globals)
|
|
3818
4092
|
|
|
3819
4093
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3823,7 +4097,10 @@ def doReplaceCertForLoadBalancers(args, parsed_globals):
|
|
|
3823
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4099
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4105
|
else:
|
|
3829
4106
|
cred = credential.Credential(
|
|
@@ -3835,18 +4112,18 @@ def doReplaceCertForLoadBalancers(args, parsed_globals):
|
|
|
3835
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4114
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4116
|
if g_param[OptionsDefine.Language]:
|
|
3840
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3842
4119
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3843
4120
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3844
4121
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3845
|
-
model = models.
|
|
4122
|
+
model = models.DescribeLoadBalancersRequest()
|
|
3846
4123
|
model.from_json_string(json.dumps(args))
|
|
3847
4124
|
start_time = time.time()
|
|
3848
4125
|
while True:
|
|
3849
|
-
rsp = client.
|
|
4126
|
+
rsp = client.DescribeLoadBalancers(model)
|
|
3850
4127
|
result = rsp.to_json_string()
|
|
3851
4128
|
try:
|
|
3852
4129
|
json_obj = json.loads(result)
|
|
@@ -3865,7 +4142,7 @@ def doReplaceCertForLoadBalancers(args, parsed_globals):
|
|
|
3865
4142
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3866
4143
|
|
|
3867
4144
|
|
|
3868
|
-
def
|
|
4145
|
+
def doDescribeBlockIPList(args, parsed_globals):
|
|
3869
4146
|
g_param = parse_global_arg(parsed_globals)
|
|
3870
4147
|
|
|
3871
4148
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3875,7 +4152,10 @@ def doCloneLoadBalancer(args, parsed_globals):
|
|
|
3875
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4154
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4160
|
else:
|
|
3881
4161
|
cred = credential.Credential(
|
|
@@ -3887,18 +4167,18 @@ def doCloneLoadBalancer(args, parsed_globals):
|
|
|
3887
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4169
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4171
|
if g_param[OptionsDefine.Language]:
|
|
3892
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3894
4174
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3895
4175
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3896
4176
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3897
|
-
model = models.
|
|
4177
|
+
model = models.DescribeBlockIPListRequest()
|
|
3898
4178
|
model.from_json_string(json.dumps(args))
|
|
3899
4179
|
start_time = time.time()
|
|
3900
4180
|
while True:
|
|
3901
|
-
rsp = client.
|
|
4181
|
+
rsp = client.DescribeBlockIPList(model)
|
|
3902
4182
|
result = rsp.to_json_string()
|
|
3903
4183
|
try:
|
|
3904
4184
|
json_obj = json.loads(result)
|
|
@@ -3917,7 +4197,7 @@ def doCloneLoadBalancer(args, parsed_globals):
|
|
|
3917
4197
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3918
4198
|
|
|
3919
4199
|
|
|
3920
|
-
def
|
|
4200
|
+
def doDescribeClassicalLBTargets(args, parsed_globals):
|
|
3921
4201
|
g_param = parse_global_arg(parsed_globals)
|
|
3922
4202
|
|
|
3923
4203
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3927,7 +4207,10 @@ def doModifyTargetGroupInstancesPort(args, parsed_globals):
|
|
|
3927
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4209
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4215
|
else:
|
|
3933
4216
|
cred = credential.Credential(
|
|
@@ -3939,18 +4222,18 @@ def doModifyTargetGroupInstancesPort(args, parsed_globals):
|
|
|
3939
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4224
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4226
|
if g_param[OptionsDefine.Language]:
|
|
3944
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3946
4229
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3947
4230
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3948
4231
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3949
|
-
model = models.
|
|
4232
|
+
model = models.DescribeClassicalLBTargetsRequest()
|
|
3950
4233
|
model.from_json_string(json.dumps(args))
|
|
3951
4234
|
start_time = time.time()
|
|
3952
4235
|
while True:
|
|
3953
|
-
rsp = client.
|
|
4236
|
+
rsp = client.DescribeClassicalLBTargets(model)
|
|
3954
4237
|
result = rsp.to_json_string()
|
|
3955
4238
|
try:
|
|
3956
4239
|
json_obj = json.loads(result)
|
|
@@ -3969,7 +4252,7 @@ def doModifyTargetGroupInstancesPort(args, parsed_globals):
|
|
|
3969
4252
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3970
4253
|
|
|
3971
4254
|
|
|
3972
|
-
def
|
|
4255
|
+
def doCreateListener(args, parsed_globals):
|
|
3973
4256
|
g_param = parse_global_arg(parsed_globals)
|
|
3974
4257
|
|
|
3975
4258
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3979,7 +4262,10 @@ def doBatchModifyTargetWeight(args, parsed_globals):
|
|
|
3979
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4264
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4270
|
else:
|
|
3985
4271
|
cred = credential.Credential(
|
|
@@ -3991,18 +4277,18 @@ def doBatchModifyTargetWeight(args, parsed_globals):
|
|
|
3991
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4279
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4281
|
if g_param[OptionsDefine.Language]:
|
|
3996
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3998
4284
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3999
4285
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4000
4286
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4001
|
-
model = models.
|
|
4287
|
+
model = models.CreateListenerRequest()
|
|
4002
4288
|
model.from_json_string(json.dumps(args))
|
|
4003
4289
|
start_time = time.time()
|
|
4004
4290
|
while True:
|
|
4005
|
-
rsp = client.
|
|
4291
|
+
rsp = client.CreateListener(model)
|
|
4006
4292
|
result = rsp.to_json_string()
|
|
4007
4293
|
try:
|
|
4008
4294
|
json_obj = json.loads(result)
|
|
@@ -4021,7 +4307,7 @@ def doBatchModifyTargetWeight(args, parsed_globals):
|
|
|
4021
4307
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4022
4308
|
|
|
4023
4309
|
|
|
4024
|
-
def
|
|
4310
|
+
def doDescribeLBOperateProtect(args, parsed_globals):
|
|
4025
4311
|
g_param = parse_global_arg(parsed_globals)
|
|
4026
4312
|
|
|
4027
4313
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4031,7 +4317,10 @@ def doDeregisterFunctionTargets(args, parsed_globals):
|
|
|
4031
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4319
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4325
|
else:
|
|
4037
4326
|
cred = credential.Credential(
|
|
@@ -4043,18 +4332,18 @@ def doDeregisterFunctionTargets(args, parsed_globals):
|
|
|
4043
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4334
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4336
|
if g_param[OptionsDefine.Language]:
|
|
4048
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4050
4339
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4051
4340
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4052
4341
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4053
|
-
model = models.
|
|
4342
|
+
model = models.DescribeLBOperateProtectRequest()
|
|
4054
4343
|
model.from_json_string(json.dumps(args))
|
|
4055
4344
|
start_time = time.time()
|
|
4056
4345
|
while True:
|
|
4057
|
-
rsp = client.
|
|
4346
|
+
rsp = client.DescribeLBOperateProtect(model)
|
|
4058
4347
|
result = rsp.to_json_string()
|
|
4059
4348
|
try:
|
|
4060
4349
|
json_obj = json.loads(result)
|
|
@@ -4073,7 +4362,7 @@ def doDeregisterFunctionTargets(args, parsed_globals):
|
|
|
4073
4362
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4074
4363
|
|
|
4075
4364
|
|
|
4076
|
-
def
|
|
4365
|
+
def doDescribeClsLogSet(args, parsed_globals):
|
|
4077
4366
|
g_param = parse_global_arg(parsed_globals)
|
|
4078
4367
|
|
|
4079
4368
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4083,7 +4372,10 @@ def doDescribeQuota(args, parsed_globals):
|
|
|
4083
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4374
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4380
|
else:
|
|
4089
4381
|
cred = credential.Credential(
|
|
@@ -4095,18 +4387,18 @@ def doDescribeQuota(args, parsed_globals):
|
|
|
4095
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4389
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4391
|
if g_param[OptionsDefine.Language]:
|
|
4100
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4102
4394
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4103
4395
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4104
4396
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4105
|
-
model = models.
|
|
4397
|
+
model = models.DescribeClsLogSetRequest()
|
|
4106
4398
|
model.from_json_string(json.dumps(args))
|
|
4107
4399
|
start_time = time.time()
|
|
4108
4400
|
while True:
|
|
4109
|
-
rsp = client.
|
|
4401
|
+
rsp = client.DescribeClsLogSet(model)
|
|
4110
4402
|
result = rsp.to_json_string()
|
|
4111
4403
|
try:
|
|
4112
4404
|
json_obj = json.loads(result)
|
|
@@ -4125,7 +4417,7 @@ def doDescribeQuota(args, parsed_globals):
|
|
|
4125
4417
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4126
4418
|
|
|
4127
4419
|
|
|
4128
|
-
def
|
|
4420
|
+
def doModifyTargetWeight(args, parsed_globals):
|
|
4129
4421
|
g_param = parse_global_arg(parsed_globals)
|
|
4130
4422
|
|
|
4131
4423
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4135,7 +4427,10 @@ def doDescribeTargetHealth(args, parsed_globals):
|
|
|
4135
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4429
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4435
|
else:
|
|
4141
4436
|
cred = credential.Credential(
|
|
@@ -4147,18 +4442,18 @@ def doDescribeTargetHealth(args, parsed_globals):
|
|
|
4147
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4444
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4446
|
if g_param[OptionsDefine.Language]:
|
|
4152
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4154
4449
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4155
4450
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4156
4451
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4157
|
-
model = models.
|
|
4452
|
+
model = models.ModifyTargetWeightRequest()
|
|
4158
4453
|
model.from_json_string(json.dumps(args))
|
|
4159
4454
|
start_time = time.time()
|
|
4160
4455
|
while True:
|
|
4161
|
-
rsp = client.
|
|
4456
|
+
rsp = client.ModifyTargetWeight(model)
|
|
4162
4457
|
result = rsp.to_json_string()
|
|
4163
4458
|
try:
|
|
4164
4459
|
json_obj = json.loads(result)
|
|
@@ -4177,7 +4472,7 @@ def doDescribeTargetHealth(args, parsed_globals):
|
|
|
4177
4472
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4178
4473
|
|
|
4179
4474
|
|
|
4180
|
-
def
|
|
4475
|
+
def doCreateTargetGroup(args, parsed_globals):
|
|
4181
4476
|
g_param = parse_global_arg(parsed_globals)
|
|
4182
4477
|
|
|
4183
4478
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4187,7 +4482,10 @@ def doBatchModifyTargetTag(args, parsed_globals):
|
|
|
4187
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4484
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4490
|
else:
|
|
4193
4491
|
cred = credential.Credential(
|
|
@@ -4199,18 +4497,18 @@ def doBatchModifyTargetTag(args, parsed_globals):
|
|
|
4199
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4499
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4501
|
if g_param[OptionsDefine.Language]:
|
|
4204
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4206
4504
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4207
4505
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4208
4506
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4209
|
-
model = models.
|
|
4507
|
+
model = models.CreateTargetGroupRequest()
|
|
4210
4508
|
model.from_json_string(json.dumps(args))
|
|
4211
4509
|
start_time = time.time()
|
|
4212
4510
|
while True:
|
|
4213
|
-
rsp = client.
|
|
4511
|
+
rsp = client.CreateTargetGroup(model)
|
|
4214
4512
|
result = rsp.to_json_string()
|
|
4215
4513
|
try:
|
|
4216
4514
|
json_obj = json.loads(result)
|
|
@@ -4229,7 +4527,7 @@ def doBatchModifyTargetTag(args, parsed_globals):
|
|
|
4229
4527
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4230
4528
|
|
|
4231
4529
|
|
|
4232
|
-
def
|
|
4530
|
+
def doDescribeTargets(args, parsed_globals):
|
|
4233
4531
|
g_param = parse_global_arg(parsed_globals)
|
|
4234
4532
|
|
|
4235
4533
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4239,7 +4537,10 @@ def doModifyTargetGroupInstancesWeight(args, parsed_globals):
|
|
|
4239
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4539
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4545
|
else:
|
|
4245
4546
|
cred = credential.Credential(
|
|
@@ -4251,18 +4552,18 @@ def doModifyTargetGroupInstancesWeight(args, parsed_globals):
|
|
|
4251
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4554
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4556
|
if g_param[OptionsDefine.Language]:
|
|
4256
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4258
4559
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4259
4560
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4260
4561
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4261
|
-
model = models.
|
|
4562
|
+
model = models.DescribeTargetsRequest()
|
|
4262
4563
|
model.from_json_string(json.dumps(args))
|
|
4263
4564
|
start_time = time.time()
|
|
4264
4565
|
while True:
|
|
4265
|
-
rsp = client.
|
|
4566
|
+
rsp = client.DescribeTargets(model)
|
|
4266
4567
|
result = rsp.to_json_string()
|
|
4267
4568
|
try:
|
|
4268
4569
|
json_obj = json.loads(result)
|
|
@@ -4281,7 +4582,7 @@ def doModifyTargetGroupInstancesWeight(args, parsed_globals):
|
|
|
4281
4582
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4282
4583
|
|
|
4283
4584
|
|
|
4284
|
-
def
|
|
4585
|
+
def doMigrateClassicalLoadBalancers(args, parsed_globals):
|
|
4285
4586
|
g_param = parse_global_arg(parsed_globals)
|
|
4286
4587
|
|
|
4287
4588
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4291,7 +4592,10 @@ def doManualRewrite(args, parsed_globals):
|
|
|
4291
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4594
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4600
|
else:
|
|
4297
4601
|
cred = credential.Credential(
|
|
@@ -4303,18 +4607,18 @@ def doManualRewrite(args, parsed_globals):
|
|
|
4303
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4609
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4611
|
if g_param[OptionsDefine.Language]:
|
|
4308
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4310
4614
|
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4311
4615
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4312
4616
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4313
|
-
model = models.
|
|
4617
|
+
model = models.MigrateClassicalLoadBalancersRequest()
|
|
4314
4618
|
model.from_json_string(json.dumps(args))
|
|
4315
4619
|
start_time = time.time()
|
|
4316
4620
|
while True:
|
|
4317
|
-
rsp = client.
|
|
4621
|
+
rsp = client.MigrateClassicalLoadBalancers(model)
|
|
4318
4622
|
result = rsp.to_json_string()
|
|
4319
4623
|
try:
|
|
4320
4624
|
json_obj = json.loads(result)
|
|
@@ -4333,10 +4637,285 @@ def doManualRewrite(args, parsed_globals):
|
|
|
4333
4637
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4334
4638
|
|
|
4335
4639
|
|
|
4336
|
-
|
|
4337
|
-
|
|
4338
|
-
|
|
4339
|
-
|
|
4640
|
+
def doDescribeLoadBalancerListByCertId(args, parsed_globals):
|
|
4641
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4642
|
+
|
|
4643
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4644
|
+
cred = credential.CVMRoleCredential()
|
|
4645
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4646
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4647
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4648
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4649
|
+
)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4654
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4655
|
+
else:
|
|
4656
|
+
cred = credential.Credential(
|
|
4657
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4658
|
+
)
|
|
4659
|
+
http_profile = HttpProfile(
|
|
4660
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4661
|
+
reqMethod="POST",
|
|
4662
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4663
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4664
|
+
)
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4666
|
+
if g_param[OptionsDefine.Language]:
|
|
4667
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4668
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4669
|
+
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4670
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4671
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4672
|
+
model = models.DescribeLoadBalancerListByCertIdRequest()
|
|
4673
|
+
model.from_json_string(json.dumps(args))
|
|
4674
|
+
start_time = time.time()
|
|
4675
|
+
while True:
|
|
4676
|
+
rsp = client.DescribeLoadBalancerListByCertId(model)
|
|
4677
|
+
result = rsp.to_json_string()
|
|
4678
|
+
try:
|
|
4679
|
+
json_obj = json.loads(result)
|
|
4680
|
+
except TypeError as e:
|
|
4681
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4682
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4683
|
+
break
|
|
4684
|
+
cur_time = time.time()
|
|
4685
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4686
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4687
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4688
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4689
|
+
else:
|
|
4690
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4691
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4692
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4693
|
+
|
|
4694
|
+
|
|
4695
|
+
def doCreateLoadBalancerSnatIps(args, parsed_globals):
|
|
4696
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4697
|
+
|
|
4698
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4699
|
+
cred = credential.CVMRoleCredential()
|
|
4700
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4701
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4702
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4703
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4704
|
+
)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4709
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4710
|
+
else:
|
|
4711
|
+
cred = credential.Credential(
|
|
4712
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4713
|
+
)
|
|
4714
|
+
http_profile = HttpProfile(
|
|
4715
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4716
|
+
reqMethod="POST",
|
|
4717
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4718
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4719
|
+
)
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4721
|
+
if g_param[OptionsDefine.Language]:
|
|
4722
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4723
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4724
|
+
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4725
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4726
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4727
|
+
model = models.CreateLoadBalancerSnatIpsRequest()
|
|
4728
|
+
model.from_json_string(json.dumps(args))
|
|
4729
|
+
start_time = time.time()
|
|
4730
|
+
while True:
|
|
4731
|
+
rsp = client.CreateLoadBalancerSnatIps(model)
|
|
4732
|
+
result = rsp.to_json_string()
|
|
4733
|
+
try:
|
|
4734
|
+
json_obj = json.loads(result)
|
|
4735
|
+
except TypeError as e:
|
|
4736
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4737
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4738
|
+
break
|
|
4739
|
+
cur_time = time.time()
|
|
4740
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4741
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4742
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4743
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4744
|
+
else:
|
|
4745
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4746
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4747
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4748
|
+
|
|
4749
|
+
|
|
4750
|
+
def doDescribeTargetGroupInstances(args, parsed_globals):
|
|
4751
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4752
|
+
|
|
4753
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4754
|
+
cred = credential.CVMRoleCredential()
|
|
4755
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4756
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4757
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4758
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4759
|
+
)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4764
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4765
|
+
else:
|
|
4766
|
+
cred = credential.Credential(
|
|
4767
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4768
|
+
)
|
|
4769
|
+
http_profile = HttpProfile(
|
|
4770
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4771
|
+
reqMethod="POST",
|
|
4772
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4773
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4774
|
+
)
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4776
|
+
if g_param[OptionsDefine.Language]:
|
|
4777
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4778
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4779
|
+
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4780
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4781
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4782
|
+
model = models.DescribeTargetGroupInstancesRequest()
|
|
4783
|
+
model.from_json_string(json.dumps(args))
|
|
4784
|
+
start_time = time.time()
|
|
4785
|
+
while True:
|
|
4786
|
+
rsp = client.DescribeTargetGroupInstances(model)
|
|
4787
|
+
result = rsp.to_json_string()
|
|
4788
|
+
try:
|
|
4789
|
+
json_obj = json.loads(result)
|
|
4790
|
+
except TypeError as e:
|
|
4791
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4792
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4793
|
+
break
|
|
4794
|
+
cur_time = time.time()
|
|
4795
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4796
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4797
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4798
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4799
|
+
else:
|
|
4800
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4801
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4802
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4803
|
+
|
|
4804
|
+
|
|
4805
|
+
def doCloneLoadBalancer(args, parsed_globals):
|
|
4806
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4807
|
+
|
|
4808
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4809
|
+
cred = credential.CVMRoleCredential()
|
|
4810
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4811
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4812
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4813
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4814
|
+
)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4819
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4820
|
+
else:
|
|
4821
|
+
cred = credential.Credential(
|
|
4822
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4823
|
+
)
|
|
4824
|
+
http_profile = HttpProfile(
|
|
4825
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4826
|
+
reqMethod="POST",
|
|
4827
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4828
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4829
|
+
)
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4831
|
+
if g_param[OptionsDefine.Language]:
|
|
4832
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4833
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4834
|
+
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4835
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4836
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4837
|
+
model = models.CloneLoadBalancerRequest()
|
|
4838
|
+
model.from_json_string(json.dumps(args))
|
|
4839
|
+
start_time = time.time()
|
|
4840
|
+
while True:
|
|
4841
|
+
rsp = client.CloneLoadBalancer(model)
|
|
4842
|
+
result = rsp.to_json_string()
|
|
4843
|
+
try:
|
|
4844
|
+
json_obj = json.loads(result)
|
|
4845
|
+
except TypeError as e:
|
|
4846
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4847
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4848
|
+
break
|
|
4849
|
+
cur_time = time.time()
|
|
4850
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4851
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4852
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4853
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4854
|
+
else:
|
|
4855
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4856
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4857
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4858
|
+
|
|
4859
|
+
|
|
4860
|
+
def doBatchModifyTargetTag(args, parsed_globals):
|
|
4861
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4862
|
+
|
|
4863
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4864
|
+
cred = credential.CVMRoleCredential()
|
|
4865
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4866
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4867
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4868
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4869
|
+
)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4874
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4875
|
+
else:
|
|
4876
|
+
cred = credential.Credential(
|
|
4877
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4878
|
+
)
|
|
4879
|
+
http_profile = HttpProfile(
|
|
4880
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4881
|
+
reqMethod="POST",
|
|
4882
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4883
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4884
|
+
)
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4886
|
+
if g_param[OptionsDefine.Language]:
|
|
4887
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4888
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4889
|
+
client = mod.ClbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4890
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4891
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4892
|
+
model = models.BatchModifyTargetTagRequest()
|
|
4893
|
+
model.from_json_string(json.dumps(args))
|
|
4894
|
+
start_time = time.time()
|
|
4895
|
+
while True:
|
|
4896
|
+
rsp = client.BatchModifyTargetTag(model)
|
|
4897
|
+
result = rsp.to_json_string()
|
|
4898
|
+
try:
|
|
4899
|
+
json_obj = json.loads(result)
|
|
4900
|
+
except TypeError as e:
|
|
4901
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4902
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4903
|
+
break
|
|
4904
|
+
cur_time = time.time()
|
|
4905
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4906
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4907
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4908
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4909
|
+
else:
|
|
4910
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4911
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4912
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4913
|
+
|
|
4914
|
+
|
|
4915
|
+
CLIENT_MAP = {
|
|
4916
|
+
"v20180317": clb_client_v20180317,
|
|
4917
|
+
|
|
4918
|
+
}
|
|
4340
4919
|
|
|
4341
4920
|
MODELS_MAP = {
|
|
4342
4921
|
"v20180317": models_v20180317,
|
|
@@ -4344,89 +4923,95 @@ MODELS_MAP = {
|
|
|
4344
4923
|
}
|
|
4345
4924
|
|
|
4346
4925
|
ACTION_MAP = {
|
|
4347
|
-
"RegisterTargets": doRegisterTargets,
|
|
4348
|
-
"DescribeResources": doDescribeResources,
|
|
4349
|
-
"ModifyFunctionTargets": doModifyFunctionTargets,
|
|
4350
|
-
"DescribeClassicalLBListeners": doDescribeClassicalLBListeners,
|
|
4351
|
-
"InquiryPriceRefundLoadBalancer": doInquiryPriceRefundLoadBalancer,
|
|
4352
4926
|
"DescribeCustomizedConfigAssociateList": doDescribeCustomizedConfigAssociateList,
|
|
4353
|
-
"DescribeBlockIPTask": doDescribeBlockIPTask,
|
|
4354
|
-
"CreateListener": doCreateListener,
|
|
4355
|
-
"DeleteLoadBalancerSnatIps": doDeleteLoadBalancerSnatIps,
|
|
4356
|
-
"DeleteListener": doDeleteListener,
|
|
4357
4927
|
"InquiryPriceModifyLoadBalancer": doInquiryPriceModifyLoadBalancer,
|
|
4358
|
-
"SetSecurityGroupForLoadbalancers": doSetSecurityGroupForLoadbalancers,
|
|
4359
4928
|
"BatchDeregisterTargets": doBatchDeregisterTargets,
|
|
4360
|
-
"RegisterTargetGroupInstances": doRegisterTargetGroupInstances,
|
|
4361
|
-
"CreateRule": doCreateRule,
|
|
4362
|
-
"DescribeClassicalLBHealthStatus": doDescribeClassicalLBHealthStatus,
|
|
4363
4929
|
"AutoRewrite": doAutoRewrite,
|
|
4364
|
-
"
|
|
4365
|
-
"
|
|
4366
|
-
"DeleteLoadBalancerListeners": doDeleteLoadBalancerListeners,
|
|
4367
|
-
"InquiryPriceRenewLoadBalancer": doInquiryPriceRenewLoadBalancer,
|
|
4368
|
-
"SetLoadBalancerSecurityGroups": doSetLoadBalancerSecurityGroups,
|
|
4369
|
-
"DeleteTargetGroups": doDeleteTargetGroups,
|
|
4370
|
-
"SetLoadBalancerStartStatus": doSetLoadBalancerStartStatus,
|
|
4930
|
+
"ModifyTargetGroupInstancesWeight": doModifyTargetGroupInstancesWeight,
|
|
4931
|
+
"AssociateCustomizedConfig": doAssociateCustomizedConfig,
|
|
4371
4932
|
"DeregisterTargetsFromClassicalLB": doDeregisterTargetsFromClassicalLB,
|
|
4372
|
-
"CreateLoadBalancer": doCreateLoadBalancer,
|
|
4373
|
-
"DescribeLoadBalancerListByCertId": doDescribeLoadBalancerListByCertId,
|
|
4374
|
-
"ModifyListener": doModifyListener,
|
|
4375
|
-
"DeleteLoadBalancer": doDeleteLoadBalancer,
|
|
4376
|
-
"InquiryPriceCreateLoadBalancer": doInquiryPriceCreateLoadBalancer,
|
|
4377
|
-
"ModifyDomainAttributes": doModifyDomainAttributes,
|
|
4378
|
-
"DisassociateTargetGroups": doDisassociateTargetGroups,
|
|
4379
|
-
"CreateTargetGroup": doCreateTargetGroup,
|
|
4380
|
-
"DeleteRewrite": doDeleteRewrite,
|
|
4381
|
-
"DescribeTargetGroupInstances": doDescribeTargetGroupInstances,
|
|
4382
|
-
"AssociateTargetGroups": doAssociateTargetGroups,
|
|
4383
|
-
"CreateLoadBalancerSnatIps": doCreateLoadBalancerSnatIps,
|
|
4384
4933
|
"DescribeLoadBalancersDetail": doDescribeLoadBalancersDetail,
|
|
4934
|
+
"AssociateTargetGroups": doAssociateTargetGroups,
|
|
4385
4935
|
"DeregisterTargetGroupInstances": doDeregisterTargetGroupInstances,
|
|
4386
|
-
"DescribeLoadBalancers": doDescribeLoadBalancers,
|
|
4387
|
-
"DescribeBlockIPList": doDescribeBlockIPList,
|
|
4388
4936
|
"DescribeListeners": doDescribeListeners,
|
|
4389
|
-
"DescribeClassicalLBTargets": doDescribeClassicalLBTargets,
|
|
4390
4937
|
"CreateTopic": doCreateTopic,
|
|
4938
|
+
"ModifyLoadBalancersProject": doModifyLoadBalancersProject,
|
|
4939
|
+
"SetCustomizedConfigForLoadBalancer": doSetCustomizedConfigForLoadBalancer,
|
|
4940
|
+
"RegisterTargetsWithClassicalLB": doRegisterTargetsWithClassicalLB,
|
|
4941
|
+
"DeregisterTargets": doDeregisterTargets,
|
|
4942
|
+
"ModifyLoadBalancerAttributes": doModifyLoadBalancerAttributes,
|
|
4943
|
+
"ModifyTargetGroupInstancesPort": doModifyTargetGroupInstancesPort,
|
|
4944
|
+
"BatchModifyTargetWeight": doBatchModifyTargetWeight,
|
|
4945
|
+
"DeleteRewrite": doDeleteRewrite,
|
|
4946
|
+
"DisassociateCustomizedConfig": doDisassociateCustomizedConfig,
|
|
4947
|
+
"SetLoadBalancerSecurityGroups": doSetLoadBalancerSecurityGroups,
|
|
4948
|
+
"InquiryPriceRefundLoadBalancer": doInquiryPriceRefundLoadBalancer,
|
|
4949
|
+
"DeleteListener": doDeleteListener,
|
|
4950
|
+
"SetSecurityGroupForLoadbalancers": doSetSecurityGroupForLoadbalancers,
|
|
4951
|
+
"RegisterTargetGroupInstances": doRegisterTargetGroupInstances,
|
|
4952
|
+
"SetLoadBalancerStartStatus": doSetLoadBalancerStartStatus,
|
|
4953
|
+
"ModifyListener": doModifyListener,
|
|
4954
|
+
"DeleteCustomizedConfig": doDeleteCustomizedConfig,
|
|
4955
|
+
"DescribeResources": doDescribeResources,
|
|
4956
|
+
"DescribeLBListeners": doDescribeLBListeners,
|
|
4391
4957
|
"BatchRegisterTargets": doBatchRegisterTargets,
|
|
4392
4958
|
"RegisterFunctionTargets": doRegisterFunctionTargets,
|
|
4393
|
-
"DescribeClsLogSet": doDescribeClsLogSet,
|
|
4394
|
-
"DescribeTaskStatus": doDescribeTaskStatus,
|
|
4395
4959
|
"DescribeCustomizedConfigList": doDescribeCustomizedConfigList,
|
|
4396
|
-
"ModifyTargetWeight": doModifyTargetWeight,
|
|
4397
|
-
"ModifyLoadBalancersProject": doModifyLoadBalancersProject,
|
|
4398
|
-
"DescribeCrossTargets": doDescribeCrossTargets,
|
|
4399
|
-
"SetCustomizedConfigForLoadBalancer": doSetCustomizedConfigForLoadBalancer,
|
|
4400
|
-
"DescribeTargetGroups": doDescribeTargetGroups,
|
|
4401
|
-
"DescribeRewrite": doDescribeRewrite,
|
|
4402
4960
|
"ModifyRule": doModifyRule,
|
|
4403
|
-
"DeleteRule": doDeleteRule,
|
|
4404
4961
|
"SetLoadBalancerClsLog": doSetLoadBalancerClsLog,
|
|
4405
|
-
"DescribeTargetGroupList": doDescribeTargetGroupList,
|
|
4406
4962
|
"ModifyBlockIPList": doModifyBlockIPList,
|
|
4407
|
-
"
|
|
4408
|
-
"DescribeLoadBalancerOverview": doDescribeLoadBalancerOverview,
|
|
4409
|
-
"DescribeTargets": doDescribeTargets,
|
|
4410
|
-
"DescribeIdleLoadBalancers": doDescribeIdleLoadBalancers,
|
|
4411
|
-
"MigrateClassicalLoadBalancers": doMigrateClassicalLoadBalancers,
|
|
4412
|
-
"RegisterTargetsWithClassicalLB": doRegisterTargetsWithClassicalLB,
|
|
4963
|
+
"DescribeRewrite": doDescribeRewrite,
|
|
4413
4964
|
"ModifyTargetPort": doModifyTargetPort,
|
|
4414
|
-
"
|
|
4965
|
+
"DeregisterFunctionTargets": doDeregisterFunctionTargets,
|
|
4415
4966
|
"ModifyLoadBalancerSla": doModifyLoadBalancerSla,
|
|
4416
|
-
"
|
|
4417
|
-
"ModifyLoadBalancerAttributes": doModifyLoadBalancerAttributes,
|
|
4418
|
-
"CreateClsLogSet": doCreateClsLogSet,
|
|
4967
|
+
"DescribeBlockIPTask": doDescribeBlockIPTask,
|
|
4419
4968
|
"DescribeClassicalLBByInstanceId": doDescribeClassicalLBByInstanceId,
|
|
4969
|
+
"DescribeLoadBalancerTraffic": doDescribeLoadBalancerTraffic,
|
|
4970
|
+
"DescribeCrossTargets": doDescribeCrossTargets,
|
|
4971
|
+
"DescribeTargetHealth": doDescribeTargetHealth,
|
|
4972
|
+
"ManualRewrite": doManualRewrite,
|
|
4973
|
+
"ModifyFunctionTargets": doModifyFunctionTargets,
|
|
4974
|
+
"DeleteLoadBalancerSnatIps": doDeleteLoadBalancerSnatIps,
|
|
4975
|
+
"CreateRule": doCreateRule,
|
|
4976
|
+
"AddCustomizedConfig": doAddCustomizedConfig,
|
|
4977
|
+
"ModifyDomain": doModifyDomain,
|
|
4978
|
+
"InquiryPriceRenewLoadBalancer": doInquiryPriceRenewLoadBalancer,
|
|
4979
|
+
"DescribeLoadBalancerOverview": doDescribeLoadBalancerOverview,
|
|
4980
|
+
"DeleteLoadBalancer": doDeleteLoadBalancer,
|
|
4981
|
+
"InquiryPriceCreateLoadBalancer": doInquiryPriceCreateLoadBalancer,
|
|
4982
|
+
"DeleteRule": doDeleteRule,
|
|
4983
|
+
"ModifyCustomizedConfig": doModifyCustomizedConfig,
|
|
4984
|
+
"DescribeTaskStatus": doDescribeTaskStatus,
|
|
4985
|
+
"DescribeTargetGroupList": doDescribeTargetGroupList,
|
|
4986
|
+
"DescribeTargetGroups": doDescribeTargetGroups,
|
|
4987
|
+
"ModifyTargetGroupAttribute": doModifyTargetGroupAttribute,
|
|
4988
|
+
"CreateClsLogSet": doCreateClsLogSet,
|
|
4989
|
+
"DescribeQuota": doDescribeQuota,
|
|
4990
|
+
"CreateLoadBalancer": doCreateLoadBalancer,
|
|
4991
|
+
"DescribeIdleLoadBalancers": doDescribeIdleLoadBalancers,
|
|
4992
|
+
"RegisterTargets": doRegisterTargets,
|
|
4993
|
+
"DescribeClassicalLBListeners": doDescribeClassicalLBListeners,
|
|
4420
4994
|
"ReplaceCertForLoadBalancers": doReplaceCertForLoadBalancers,
|
|
4995
|
+
"DeleteLoadBalancerListeners": doDeleteLoadBalancerListeners,
|
|
4996
|
+
"DeleteTargetGroups": doDeleteTargetGroups,
|
|
4997
|
+
"DescribeClassicalLBHealthStatus": doDescribeClassicalLBHealthStatus,
|
|
4998
|
+
"ModifyDomainAttributes": doModifyDomainAttributes,
|
|
4999
|
+
"DisassociateTargetGroups": doDisassociateTargetGroups,
|
|
5000
|
+
"DescribeLoadBalancers": doDescribeLoadBalancers,
|
|
5001
|
+
"DescribeBlockIPList": doDescribeBlockIPList,
|
|
5002
|
+
"DescribeClassicalLBTargets": doDescribeClassicalLBTargets,
|
|
5003
|
+
"CreateListener": doCreateListener,
|
|
5004
|
+
"DescribeLBOperateProtect": doDescribeLBOperateProtect,
|
|
5005
|
+
"DescribeClsLogSet": doDescribeClsLogSet,
|
|
5006
|
+
"ModifyTargetWeight": doModifyTargetWeight,
|
|
5007
|
+
"CreateTargetGroup": doCreateTargetGroup,
|
|
5008
|
+
"DescribeTargets": doDescribeTargets,
|
|
5009
|
+
"MigrateClassicalLoadBalancers": doMigrateClassicalLoadBalancers,
|
|
5010
|
+
"DescribeLoadBalancerListByCertId": doDescribeLoadBalancerListByCertId,
|
|
5011
|
+
"CreateLoadBalancerSnatIps": doCreateLoadBalancerSnatIps,
|
|
5012
|
+
"DescribeTargetGroupInstances": doDescribeTargetGroupInstances,
|
|
4421
5013
|
"CloneLoadBalancer": doCloneLoadBalancer,
|
|
4422
|
-
"ModifyTargetGroupInstancesPort": doModifyTargetGroupInstancesPort,
|
|
4423
|
-
"BatchModifyTargetWeight": doBatchModifyTargetWeight,
|
|
4424
|
-
"DeregisterFunctionTargets": doDeregisterFunctionTargets,
|
|
4425
|
-
"DescribeQuota": doDescribeQuota,
|
|
4426
|
-
"DescribeTargetHealth": doDescribeTargetHealth,
|
|
4427
5014
|
"BatchModifyTargetTag": doBatchModifyTargetTag,
|
|
4428
|
-
"ModifyTargetGroupInstancesWeight": doModifyTargetGroupInstancesWeight,
|
|
4429
|
-
"ManualRewrite": doManualRewrite,
|
|
4430
5015
|
|
|
4431
5016
|
}
|
|
4432
5017
|
|